International Journal of Network Security | ||
1. | An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks
|
|
Doraipandian Manivannan, P. Neelamegam, Vol. 17, No. 6, 2015, pp. 651-660 Article Full Text PDF |
||
2. | Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data
|
|
Xingbing Fu, Shengke Zeng, and Fagen Li, Vol. 17, No. 6, 2015, pp. 661-671 Article Full Text PDF |
||
3. | Anomaly Detection Using an MMPP-based GLRT
|
|
Chris Scheper and William J. J. Roberts, Vol. 17, No. 6, 2015, pp. 672-677 Article Full Text PDF |
||
4. | Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round
|
|
Qingfeng Cheng and Chunming Tang, Vol. 17, No. 6, 2015, pp. 678-682 Article Full Text PDF |
||
5. | Towards Generating Real-life Datasets for Network Intrusion Detection
|
|
Monowar H. Bhuyan, Dhruba K. Bhattacharyya, and Jugal K. Kalita, Vol. 17, No. 6, 2015, pp. 683-701 Article Full Text PDF |
||
6. | An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks
|
|
Chin-Chen Chang, Jen-Ho Yang and Yu-Ching Wu, Vol. 17, No. 6, 2015, pp. 702-707 Article Full Text PDF |
||
7. | On the Privacy of “User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking”
|
|
Yalin Chen, Jue-Sam Chou, Vol. 17, No. 6, 2015, pp. 708-711 Article Full Text PDF |
||
8. | A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks
|
|
Tung-Huang Feng, Neng-Yih Shih, and Min-Shiang Hwang, Vol. 17, No. 6, 2015, pp. 712-721 Article Full Text PDF |
||
9. | Hiding of Confidential Data in Spatial Domain Images using Image Interpolation
|
|
S. Maria Celestin Vigila, K. Muneeswaran, Vol. 17, No. 6, 2015, pp. 722-727 Article Full Text PDF |
||
10. | Cryptanalysis of Two Efficient Password-based Authentication Schemes Using Smart Cards
|
|
Ying Wang and Xinguang Peng, Vol. 17, No. 6, 2015, pp. 728-735 Article Full Text PDF |
||
11. | Provable Secure Multi-Proxy Signature Scheme without Bilinear Maps
|
|
Namita Tiwari and Sahadeo Padhye, Vol. 17, No. 6, 2015, pp. 736-742 Article Full Text PDF |
||
12. | Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing
|
|
Xu Ma, Jin Li, and Fangguo Zhang, Vol. 17, No. 6, 2015, pp. 743-753 Article Full Text PDF |
||
13. | IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach
|
|
Ghazaleh Javadzadeh, Reza Azmi, Vol. 17, No. 6, 2015, pp. 754-770 Article Full Text PDF |
||
14. | A Dynamic Threshold Decryption Scheme Using Bilinear Pairings
|
|
Brian King, Vol. 17, No. 6, 2015, pp. 771-778 Article Full Text PDF |
||
15. | Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme
|
|
Yang Zhao, Feng Yue, Songyang Wu, Hu Xiong, and Zhiguang Qin, Vol. 17, No. 6, 2015, pp. 779-786 Article Full Text PDF |
||
16. | An Improved Anonymous Password Authentication Scheme Using Nonce and Bilinear Pairings
|
|
Jie Ling, Guangqiang Zhao, Vol. 17, No. 6, 2015, pp. 787-794 Article Full Text PDF |
||
17. | On the Security of Three Public Auditing Schemes in Cloud Computing
|
|
Yang Ming, Yumin Wang, Vol. 17, No. 6, 2015, pp. 795-802 Article Full Text PDF |
||
18. | Reviewer index to volume 17 (2015)
|
|
Article Full Text PDF | ||