Quick Search:

Volume: 17, No: 5 (September 1, 2015)

International Journal of Network Security

1. A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure
Jia-Rong Sun, Mao-Lin Shih, Min-Shiang Hwang, Vol. 17, No. 5, 2015, pp. 497-509
Article Full Text PDF

2. An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol
Reddi Siva Ranjani, D. Lalitha Bhaskari, P. S. Avadhani, Vol. 17, No. 5, 2015, pp. 510-516
Article Full Text PDF

3. A Security Quantitative Analysis Method For Access Control Based on Security Entropy
Tian-Wei Che, Jian-Feng Ma, Na Li, Chao Wang, Vol. 17, No. 5, 2015, pp. 517-521
Article Full Text PDF

4. Adoption of a Fuzzy Based Classification Model for P2P Botnet Detection
Pijush Barthakur, Manoj Dahal, Mrinal Kanti Ghose, Vol. 17, No. 5, 2015, pp. 522-534
Article Full Text PDF

5. Analysing and Improving Performance and Security of Cryptographically Generated Address Algorithm for Mobile IPv6 Networks
Sana Qadir, Mohammad Umar Siddiqi, Wajdi F. M. Al-Khateeb, Vol. 17, No. 5, 2015, pp. 535-547
Article Full Text PDF

6. Provably-Secure Certificateless Key Encapsulation Mechanism for e-Healthcare System
Hui-Xian Shi, Rui Guo, Vol. 17, No. 5, 2015, pp. 548-557
Article Full Text PDF

7. A Study of DWT-SVD Based Multiple Watermarking Scheme for Medical Images
Natarajan Mohananthini and Govindarajan Yamuna, Vol. 17, No. 5, 2015, pp. 558-568
Article Full Text PDF

8. Leveraging P2P Interactions for Efficient Location Privacy in Database-driven Dynamic Spectrum Access
Erald Troja, Spiridon Bakiras, Vol. 17, No. 5, 2015, pp. 569-579
Article Full Text PDF

9. Provably Secure Identity-based Aggregate Signcryption Scheme in Random Oracles
Jayaprakash Kar, Vol. 17, No. 5, 2015, pp. 580-587
Article Full Text PDF

10. Elliptic Curve Based Dynamic Contributory Group Key Agreement Protocol for Secure Group Communication over Ad-hoc Networks
Vankamamidi Srinivasa Naresh and Nistala V.E.S. Murthy, Vol. 17, No. 5, 2015, pp. 588-596
Article Full Text PDF

11. An Improved Certificateless Signcryption in the Standard Model
Lin Cheng, Qiaoyan Wen, Vol. 17, No. 5, 2015, pp. 597-606
Article Full Text PDF

12. Adjustment Hiding Method Based on Exploiting Modification Direction
Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu , Vol. 17, No. 5, 2015, pp. 607-618
Article Full Text PDF

13. A Practical Forward-Secure Public-Key Encryption Scheme with Untrusted Update
Xiujie Zhang, Chunxiang Xu, Vol. 17, No. 5, 2015, pp. 619-628
Article Full Text PDF

14. Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments
Mohsen Toorani, Vol. 17, No. 5, 2015, pp. 629-636
Article Full Text PDF

15. A Component Histogram Map Based Text Similarity Detection Algorithm
Huajun Huang, Shuang Pang, Qiong Deng, Jiaohua Qin, Vol. 17, No. 5, 2015, pp. 637-642
Article Full Text PDF

16. A Meaningful Scheme for Sharing Secret Images Using Mosaic Images
Shengyun Zhai, Fan Li, Chin-Chen Chang, Qian Mao, Vol. 17, No. 5, 2015, pp. 643-649
Article Full Text PDF