Quick Search:

Volume: 18, No: 1 (January 1, 2016)

International Journal of Network Security

1. Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs
Adarsh Kumar, Krishna Gopal, Alok Aggarwal, Vol. 18, No. 1, 2016, pp. 1-18
Article Full Text PDF

2. Asynchronous Invariant Digital Image Watermarking in Radon Field for Resistant Encrypted Watermark
Dhekra Essaidani, Hassene Seddik, and Ezzedine Ben Braiek, Vol. 18, No. 1, 2016, pp. 19-32
Article Full Text PDF

3. Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders
Ziba Eslami, Mahnaz Noroozi, and Saideh Kabiri Rad, Vol. 18, No. 1, 2016, pp. 33-42
Article Full Text PDF

4. A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks
Zhiyong Zhang, Lijun Yang, Hanman Li, and Fei Xiang , Vol. 18, No. 1, 2016, pp. 43-51
Article Full Text PDF

5. Reversible Data Hiding Based on Geometric Structure of Pixel Groups
Zhi-Hui Wang, Xu Zhuang, Chin-Chen Chang, Chuan Qin, Yan Zhu, Vol. 18, No. 1, 2016, pp. 52-59
Article Full Text PDF

6. Construction of Extended Multivariate Public Key Cryptosystems
Shuaiting Qiao, Wenbao Han, Yifa Li, and Luyao Jiao, Vol. 18, No. 1, 2016, pp. 60-67
Article Full Text PDF

7. A Key Based Secure Threshold Cryptography for Secret Image
Prabir Kr. Naskar, Hari Narayan Khan, and Atal Chaudhuri, Vol. 18, No. 1, 2016, pp. 68-81
Article Full Text PDF

8. An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks
Gaurav Sharma, Suman Bala, Anil K. Verma, Vol. 18, No. 1, 2016, pp. 82-89
Article Full Text PDF

9. Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues
Feng Wang, Chin-Chen Chang, Changlu Lin, Shih-Chang Chang, Vol. 18, No. 1, 2016, pp. 90-98
Article Full Text PDF

10. Practical Implementation of a Secure Email System Using Certificateless Cryptography and Domain Name System
Suresh Kumar Balakrishnan, V. P. Jagathy Raj , Vol. 18, No. 1, 2016, pp. 99-107
Article Full Text PDF

11. Speeding up Pairing Computation Using Non-adjacent Form and ELM Method
Chao-Liang Liu, Gwoboa Horng, Du-Shiau Tsai , Vol. 18, No. 1, 2016, pp. 108-115
Article Full Text PDF

12. A Novel and Provable Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps towards Mobile Network
Hongfeng Zhu, Yifeng Zhang, Yan Zhang and Haiyang Li, Vol. 18, No. 1, 2016, pp. 116-123
Article Full Text PDF

13. A Secure Steganography Method Based on Integer Lifting Wavelet Transform
Seyyed Amin Seyyedi, Vasili Sadau, Nick Ivanov, Vol. 18, No. 1, 2016, pp. 124-132
Article Full Text PDF

14. A Survey of Public Auditing for Secure Data Storage in Cloud Computing
Wei-Fu Hsien, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 18, No. 1, 2016, pp. 133-142
Article Full Text PDF

15. 3CAuth – A Novel Multi-Factor Authentication Scheme Using QR-Code
Harini Narasimhan and T. R. Padmanabhan, Vol. 18, No. 1, 2016, pp. 143-150
Article Full Text PDF

16. The Development of Deniable Authentication Protocol Based on The Bivariate Function Hard Problem
Normahirah Nek Abd Rahman and Muhammad Rezal Kamel Ariffin, Vol. 18, No. 1, 2016, pp. 151-157
Article Full Text PDF

17. Analysis of Second Order Matrices Construction in MFE Public Key Cryptosystem
Xuyun Nie, Chuanyong Hou, Zhaohu Xu, Gang Lu, Vol. 18, No. 1, 2016, pp. 158-164
Article Full Text PDF

18. Cryptanalysis of an Identity Based Signcryption Scheme in the Standard Model
Yang Ming and Yumin Wang, Vol. 18, No. 1, 2016, pp. 165-171
Article Full Text PDF

19. Cryptanalysis and Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-server Environment Using Smart Card
Ruhul Amin, Vol. 18, No. 1, 2016, pp. 172-181
Article Full Text PDF

20. Malicious Behavior Monitoring for Android Applications
Quan Qian, Jing Cai, Mengbo Xie, Rui Zhang, Vol. 18, No. 1, 2016, pp. 182-192
Article Full Text PDF

21. Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks
Guangsong Li, Qi Jiang, Yanan Shi, and Fushan Wei, Vol. 18, No. 1, 2016, pp. 193-200
Article Full Text PDF