Quick Search:

Volume: 17, No: 6 (November 1, 2015)

International Journal of Network Security

1. An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks
Doraipandian Manivannan, P. Neelamegam, Vol. 17, No. 6, 2015, pp. 651-660
Article Full Text PDF

2. Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data
Xingbing Fu, Shengke Zeng, and Fagen Li, Vol. 17, No. 6, 2015, pp. 661-671
Article Full Text PDF

3. Anomaly Detection Using an MMPP-based GLRT
Chris Scheper and William J. J. Roberts, Vol. 17, No. 6, 2015, pp. 672-677
Article Full Text PDF

4. Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round
Qingfeng Cheng and Chunming Tang, Vol. 17, No. 6, 2015, pp. 678-682
Article Full Text PDF

5. Towards Generating Real-life Datasets for Network Intrusion Detection
Monowar H. Bhuyan, Dhruba K. Bhattacharyya, and Jugal K. Kalita, Vol. 17, No. 6, 2015, pp. 683-701
Article Full Text PDF

6. An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks
Chin-Chen Chang, Jen-Ho Yang and Yu-Ching Wu, Vol. 17, No. 6, 2015, pp. 702-707
Article Full Text PDF

7. On the Privacy of “User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking”
Yalin Chen, Jue-Sam Chou, Vol. 17, No. 6, 2015, pp. 708-711
Article Full Text PDF

8. A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks
Tung-Huang Feng, Neng-Yih Shih, and Min-Shiang Hwang, Vol. 17, No. 6, 2015, pp. 712-721
Article Full Text PDF

9. Hiding of Confidential Data in Spatial Domain Images using Image Interpolation
S. Maria Celestin Vigila, K. Muneeswaran, Vol. 17, No. 6, 2015, pp. 722-727
Article Full Text PDF

10. Cryptanalysis of Two Efficient Password-based Authentication Schemes Using Smart Cards
Ying Wang and Xinguang Peng, Vol. 17, No. 6, 2015, pp. 728-735
Article Full Text PDF

11. Provable Secure Multi-Proxy Signature Scheme without Bilinear Maps
Namita Tiwari and Sahadeo Padhye, Vol. 17, No. 6, 2015, pp. 736-742
Article Full Text PDF

12. Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing
Xu Ma, Jin Li, and Fangguo Zhang, Vol. 17, No. 6, 2015, pp. 743-753
Article Full Text PDF

13. IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach
Ghazaleh Javadzadeh, Reza Azmi, Vol. 17, No. 6, 2015, pp. 754-770
Article Full Text PDF

14. A Dynamic Threshold Decryption Scheme Using Bilinear Pairings
Brian King, Vol. 17, No. 6, 2015, pp. 771-778
Article Full Text PDF

15. Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme
Yang Zhao, Feng Yue, Songyang Wu, Hu Xiong, and Zhiguang Qin, Vol. 17, No. 6, 2015, pp. 779-786
Article Full Text PDF

16. An Improved Anonymous Password Authentication Scheme Using Nonce and Bilinear Pairings
Jie Ling, Guangqiang Zhao, Vol. 17, No. 6, 2015, pp. 787-794
Article Full Text PDF

17. On the Security of Three Public Auditing Schemes in Cloud Computing
Yang Ming, Yumin Wang, Vol. 17, No. 6, 2015, pp. 795-802
Article Full Text PDF

18. Reviewer index to volume 17 (2015)
Article Full Text PDF