International Journal of Network Security | ||
1. | Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs
|
|
Adarsh Kumar, Krishna Gopal, Alok Aggarwal, Vol. 18, No. 1, 2016, pp. 1-18 Article Full Text PDF |
||
2. | Asynchronous Invariant Digital Image Watermarking in Radon Field for Resistant Encrypted Watermark
|
|
Dhekra Essaidani, Hassene Seddik, and Ezzedine Ben Braiek, Vol. 18, No. 1, 2016, pp. 19-32 Article Full Text PDF |
||
3. | Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders
|
|
Ziba Eslami, Mahnaz Noroozi, and Saideh Kabiri Rad, Vol. 18, No. 1, 2016, pp. 33-42 Article Full Text PDF |
||
4. | A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks
|
|
Zhiyong Zhang, Lijun Yang, Hanman Li, and Fei Xiang , Vol. 18, No. 1, 2016, pp. 43-51 Article Full Text PDF |
||
5. | Reversible Data Hiding Based on Geometric Structure of Pixel Groups
|
|
Zhi-Hui Wang, Xu Zhuang, Chin-Chen Chang, Chuan Qin, Yan Zhu, Vol. 18, No. 1, 2016, pp. 52-59 Article Full Text PDF |
||
6. | Construction of Extended Multivariate Public Key Cryptosystems
|
|
Shuaiting Qiao, Wenbao Han, Yifa Li, and Luyao Jiao, Vol. 18, No. 1, 2016, pp. 60-67 Article Full Text PDF |
||
7. | A Key Based Secure Threshold Cryptography for Secret Image
|
|
Prabir Kr. Naskar, Hari Narayan Khan, and Atal Chaudhuri, Vol. 18, No. 1, 2016, pp. 68-81 Article Full Text PDF |
||
8. | An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks
|
|
Gaurav Sharma, Suman Bala, Anil K. Verma, Vol. 18, No. 1, 2016, pp. 82-89 Article Full Text PDF |
||
9. | Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues
|
|
Feng Wang, Chin-Chen Chang, Changlu Lin, Shih-Chang Chang, Vol. 18, No. 1, 2016, pp. 90-98 Article Full Text PDF |
||
10. | Practical Implementation of a Secure Email System Using Certificateless Cryptography and Domain Name System
|
|
Suresh Kumar Balakrishnan, V. P. Jagathy Raj , Vol. 18, No. 1, 2016, pp. 99-107 Article Full Text PDF |
||
11. | Speeding up Pairing Computation Using Non-adjacent Form and ELM Method
|
|
Chao-Liang Liu, Gwoboa Horng, Du-Shiau Tsai , Vol. 18, No. 1, 2016, pp. 108-115 Article Full Text PDF |
||
12. | A Novel and Provable Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps towards Mobile Network
|
|
Hongfeng Zhu, Yifeng Zhang, Yan Zhang and Haiyang Li, Vol. 18, No. 1, 2016, pp. 116-123 Article Full Text PDF |
||
13. | A Secure Steganography Method Based on Integer Lifting Wavelet Transform
|
|
Seyyed Amin Seyyedi, Vasili Sadau, Nick Ivanov, Vol. 18, No. 1, 2016, pp. 124-132 Article Full Text PDF |
||
14. | A Survey of Public Auditing for Secure Data Storage in Cloud Computing
|
|
Wei-Fu Hsien, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 18, No. 1, 2016, pp. 133-142 Article Full Text PDF |
||
15. | 3CAuth – A Novel Multi-Factor Authentication Scheme Using QR-Code
|
|
Harini Narasimhan and T. R. Padmanabhan, Vol. 18, No. 1, 2016, pp. 143-150 Article Full Text PDF |
||
16. | The Development of Deniable Authentication Protocol Based on The Bivariate Function Hard Problem
|
|
Normahirah Nek Abd Rahman and Muhammad Rezal Kamel Ariffin, Vol. 18, No. 1, 2016, pp. 151-157 Article Full Text PDF |
||
17. | Analysis of Second Order Matrices Construction in MFE Public Key Cryptosystem
|
|
Xuyun Nie, Chuanyong Hou, Zhaohu Xu, Gang Lu, Vol. 18, No. 1, 2016, pp. 158-164 Article Full Text PDF |
||
18. | Cryptanalysis of an Identity Based Signcryption Scheme in the Standard Model
|
|
Yang Ming and Yumin Wang, Vol. 18, No. 1, 2016, pp. 165-171 Article Full Text PDF |
||
19. | Cryptanalysis and Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-server Environment Using Smart Card
|
|
Ruhul Amin, Vol. 18, No. 1, 2016, pp. 172-181 Article Full Text PDF |
||
20. | Malicious Behavior Monitoring for Android Applications
|
|
Quan Qian, Jing Cai, Mengbo Xie, Rui Zhang, Vol. 18, No. 1, 2016, pp. 182-192 Article Full Text PDF |
||
21. | Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks
|
|
Guangsong Li, Qi Jiang, Yanan Shi, and Fushan Wei, Vol. 18, No. 1, 2016, pp. 193-200 Article Full Text PDF |
||