| International Journal of Network Security | ||
| 1. | An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks
|
|
| Doraipandian Manivannan, P. Neelamegam, Vol. 17, No. 6, 2015, pp. 651-660 Article Full Text PDF |
||
| 2. | Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data
|
|
| Xingbing Fu, Shengke Zeng, and Fagen Li, Vol. 17, No. 6, 2015, pp. 661-671 Article Full Text PDF |
||
| 3. | Anomaly Detection Using an MMPP-based GLRT
|
|
| Chris Scheper and William J. J. Roberts, Vol. 17, No. 6, 2015, pp. 672-677 Article Full Text PDF |
||
| 4. | Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round
|
|
| Qingfeng Cheng and Chunming Tang, Vol. 17, No. 6, 2015, pp. 678-682 Article Full Text PDF |
||
| 5. | Towards Generating Real-life Datasets for Network Intrusion Detection
|
|
| Monowar H. Bhuyan, Dhruba K. Bhattacharyya, and Jugal K. Kalita, Vol. 17, No. 6, 2015, pp. 683-701 Article Full Text PDF |
||
| 6. | An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks
|
|
| Chin-Chen Chang, Jen-Ho Yang and Yu-Ching Wu, Vol. 17, No. 6, 2015, pp. 702-707 Article Full Text PDF |
||
| 7. | On the Privacy of “User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking”
|
|
| Yalin Chen, Jue-Sam Chou, Vol. 17, No. 6, 2015, pp. 708-711 Article Full Text PDF |
||
| 8. | A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks
|
|
| Tung-Huang Feng, Neng-Yih Shih, and Min-Shiang Hwang, Vol. 17, No. 6, 2015, pp. 712-721 Article Full Text PDF |
||
| 9. | Hiding of Confidential Data in Spatial Domain Images using Image Interpolation
|
|
| S. Maria Celestin Vigila, K. Muneeswaran, Vol. 17, No. 6, 2015, pp. 722-727 Article Full Text PDF |
||
| 10. | Cryptanalysis of Two Efficient Password-based Authentication Schemes Using Smart Cards
|
|
| Ying Wang and Xinguang Peng, Vol. 17, No. 6, 2015, pp. 728-735 Article Full Text PDF |
||
| 11. | Provable Secure Multi-Proxy Signature Scheme without Bilinear Maps
|
|
| Namita Tiwari and Sahadeo Padhye, Vol. 17, No. 6, 2015, pp. 736-742 Article Full Text PDF |
||
| 12. | Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing
|
|
| Xu Ma, Jin Li, and Fangguo Zhang, Vol. 17, No. 6, 2015, pp. 743-753 Article Full Text PDF |
||
| 13. | IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach
|
|
| Ghazaleh Javadzadeh, Reza Azmi, Vol. 17, No. 6, 2015, pp. 754-770 Article Full Text PDF |
||
| 14. | A Dynamic Threshold Decryption Scheme Using Bilinear Pairings
|
|
| Brian King, Vol. 17, No. 6, 2015, pp. 771-778 Article Full Text PDF |
||
| 15. | Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme
|
|
| Yang Zhao, Feng Yue, Songyang Wu, Hu Xiong, and Zhiguang Qin, Vol. 17, No. 6, 2015, pp. 779-786 Article Full Text PDF |
||
| 16. | An Improved Anonymous Password Authentication Scheme Using Nonce and Bilinear Pairings
|
|
| Jie Ling, Guangqiang Zhao, Vol. 17, No. 6, 2015, pp. 787-794 Article Full Text PDF |
||
| 17. | On the Security of Three Public Auditing Schemes in Cloud Computing
|
|
| Yang Ming, Yumin Wang, Vol. 17, No. 6, 2015, pp. 795-802 Article Full Text PDF |
||
| 18. | Reviewer index to volume 17 (2015)
|
|
| Article Full Text PDF | ||