| International Journal of Network Security | ||
| 1. | A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure
|
|
| Jia-Rong Sun, Mao-Lin Shih, Min-Shiang Hwang, Vol. 17, No. 5, 2015, pp. 497-509 Article Full Text PDF |
||
| 2. | An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol
|
|
| Reddi Siva Ranjani, D. Lalitha Bhaskari, P. S. Avadhani, Vol. 17, No. 5, 2015, pp. 510-516 Article Full Text PDF |
||
| 3. | A Security Quantitative Analysis Method For Access Control Based on Security Entropy
|
|
| Tian-Wei Che, Jian-Feng Ma, Na Li, Chao Wang, Vol. 17, No. 5, 2015, pp. 517-521 Article Full Text PDF |
||
| 4. | Adoption of a Fuzzy Based Classification Model for P2P Botnet Detection
|
|
| Pijush Barthakur, Manoj Dahal, Mrinal Kanti Ghose, Vol. 17, No. 5, 2015, pp. 522-534 Article Full Text PDF |
||
| 5. | Analysing and Improving Performance and Security of Cryptographically Generated Address Algorithm for Mobile IPv6 Networks
|
|
| Sana Qadir, Mohammad Umar Siddiqi, Wajdi F. M. Al-Khateeb, Vol. 17, No. 5, 2015, pp. 535-547 Article Full Text PDF |
||
| 6. | Provably-Secure Certificateless Key Encapsulation Mechanism for e-Healthcare System
|
|
| Hui-Xian Shi, Rui Guo, Vol. 17, No. 5, 2015, pp. 548-557 Article Full Text PDF |
||
| 7. | A Study of DWT-SVD Based Multiple Watermarking Scheme for Medical Images
|
|
| Natarajan Mohananthini and Govindarajan Yamuna, Vol. 17, No. 5, 2015, pp. 558-568 Article Full Text PDF |
||
| 8. | Leveraging P2P Interactions for Efficient Location Privacy in Database-driven Dynamic Spectrum Access
|
|
| Erald Troja, Spiridon Bakiras, Vol. 17, No. 5, 2015, pp. 569-579 Article Full Text PDF |
||
| 9. | Provably Secure Identity-based Aggregate Signcryption Scheme in Random Oracles
|
|
| Jayaprakash Kar, Vol. 17, No. 5, 2015, pp. 580-587 Article Full Text PDF |
||
| 10. | Elliptic Curve Based Dynamic Contributory Group Key Agreement Protocol for Secure Group Communication over Ad-hoc Networks
|
|
| Vankamamidi Srinivasa Naresh and Nistala V.E.S. Murthy, Vol. 17, No. 5, 2015, pp. 588-596 Article Full Text PDF |
||
| 11. | An Improved Certificateless Signcryption in the Standard Model
|
|
| Lin Cheng, Qiaoyan Wen, Vol. 17, No. 5, 2015, pp. 597-606 Article Full Text PDF |
||
| 12. | Adjustment Hiding Method Based on Exploiting Modification Direction
|
|
| Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu , Vol. 17, No. 5, 2015, pp. 607-618 Article Full Text PDF |
||
| 13. | A Practical Forward-Secure Public-Key Encryption Scheme with Untrusted Update
|
|
| Xiujie Zhang, Chunxiang Xu, Vol. 17, No. 5, 2015, pp. 619-628 Article Full Text PDF |
||
| 14. | Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments
|
|
| Mohsen Toorani, Vol. 17, No. 5, 2015, pp. 629-636 Article Full Text PDF |
||
| 15. | A Component Histogram Map Based Text Similarity Detection Algorithm
|
|
| Huajun Huang, Shuang Pang, Qiong Deng, Jiaohua Qin, Vol. 17, No. 5, 2015, pp. 637-642 Article Full Text PDF |
||
| 16. | A Meaningful Scheme for Sharing Secret Images Using Mosaic Images
|
|
| Shengyun Zhai, Fan Li, Chin-Chen Chang, Qian Mao, Vol. 17, No. 5, 2015, pp. 643-649 Article Full Text PDF |
||