International Journal of Network Security | ||
1. | A Strong RSA-based and Certificateless-based Signature Scheme
|
|
Chin-Chen Chang, Chin-Yu Sun, and Shih-Chang Chang, Vol. 18, No. 2, 2016, pp. 201-208 Article Full Text PDF |
||
2. | A Novel Biometrics-based One-Time Commitment Authenticated Key Agreement Scheme with Privacy Protection for Mobile Network
|
|
Hongfeng Zhu, Yan Zhang, Haiyang Li, and Lin Lin, Vol. 18, No. 2, 2016, pp. 209-216 Article Full Text PDF |
||
3. | A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC
|
|
Dianli Guo and Fengtong Wen, Vol. 18, No. 2, 2016, pp. 217-223 Article Full Text PDF |
||
4. | Increasing Accuracy and Reliability of IP Traceback for DDoS Attack Using Completion Condition
|
|
Samant Saurabh and Ashok Singh Sairam, Vol. 18, No. 2, 2016, pp. 224-234 Article Full Text PDF |
||
5. | Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System
|
|
Hisham Abdalla, Xiong Hu, Abubaker Wahaballa, Philip Avornyo and Qin Zhiguang, Vol. 18, No. 2, 2016, pp. 235-243 Article Full Text PDF |
||
6. | Linear Complexity of Some Binary Interleaved Sequences of Period 4N
|
|
Xiao Ma, Tongjiang Yan, Daode Zhang, Yanyan Liu, Vol. 18, No. 2, 2016, pp. 244-249 Article Full Text PDF |
||
7. | A New Robust Blind Copyright Protection Scheme Based on Visual Cryptography and Steerable Pyramid
|
|
Azz El Arab El Hossaini, Mohamed El Aroussi, Khadija Jamali, Samir Mbarki, and Mohammed Wahbi, Vol. 18, No. 2, 2016, pp. 250-262 Article Full Text PDF |
||
8. | Anonymous ID-based Group Key Agreement Protocol without Pairing
|
|
Abhimanyu Kumar and Sachin Tripathi, Vol. 18, No. 2, 2016, pp. 263-273 Article Full Text PDF |
||
9. | Information Hiding in Standard MIDI Files Based on Velocity Reference Values
|
|
Da-Chun Wu, Ming-Yao Chen, Vol. 18, No. 2, 2016, pp. 274-282 Article Full Text PDF |
||
10. | Verifiable Delegation of Polynomials
|
|
Jun Ye, Haiyan Zhang, and Changyou Fu, Vol. 18, No. 2, 2016, pp. 283-290 Article Full Text PDF |
||
11. | Inspired Pseudo Biotic DNA Based Cryptographic Mechanism Against Adaptive Cryptographic Attacks
|
|
E. Suresh Babu, C. Naga Raju, and Munaga HM Krishna Prasad, Vol. 18, No. 2, 2016, pp. 291-303 Article Full Text PDF |
||
12. | Towards Modelling Perfect Forward Secrecy for One-round Group Key Exchange
|
|
Zheng Yang and Daigu Zhang, Vol. 18, No. 2, 2016, pp. 304-315 Article Full Text PDF |
||
13. | Inferential SQL Injection Attacks
|
|
Miroslav Stampar, Vol. 18, No. 2, 2016, pp. 316-325 Article Full Text PDF |
||
14. | Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model
|
|
Hongfeng Zhu, Yifeng Zhang, Yu Xia, and Haiyang Li, Vol. 18, No. 2, 2016, pp. 326-334 Article Full Text PDF |
||
15. | Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability
|
|
Hai-Duong Le, Ngoc-Tu Nguyen, and Chin-Chen Chang, Vol. 18, No. 2, 2016, pp. 335-344 Article Full Text PDF |
||
16. | A New Iterative Secret Key Cryptosystem Based on Reversible and Irreversible Cellular Automata
|
|
Said Bouchkaren, Saiida Lazaar, Vol. 18, No. 2, 2016, pp. 345-353 Article Full Text PDF |
||
17. | A Lightweight RFID Security Protocol Based on Elliptic Curve Cryptography
|
|
Quan Qian, Yan-Long Jia, Rui Zhang, Vol. 18, No. 2, 2016, pp. 354-361 Article Full Text PDF |
||
18. | Cryptanalysis of an Efficient Password Authentication Scheme
|
|
Prasanth Kumar Thandra, J. Rajan, and S. A. V. Satya Murty, Vol. 18, No. 2, 2016, pp. 362-368 Article Full Text PDF |
||
19. | On Using Mersenne Primes in Designing Cryptoschemes
|
|
Nikolay Andreevich Moldovyan, Alexander Andreevich Moldovyan, Andrey Nikolaevich Berezin, Vol. 18, No. 2, 2016, pp. 369-373 Article Full Text PDF |
||
20. | ECPB: Efficient Conditional Privacy-Preserving Authentication Scheme Supporting Batch Verification for VANETs
|
|
Yimin Wang, Hong Zhong, Yan Xu, and Jie Cui, Vol. 18, No. 2, 2016, pp. 374-382 Article Full Text PDF |
||
21. | A Measurement Study of the Content Security Policy on Real-World Applications
|
|
Kailas Patil and Braun Frederik, Vol. 18, No. 2, 2016, pp. 383-392 Article Full Text PDF |
||
22. | Attack on An ID-based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
|
|
Fushan Wei, Yun Wei, and Chuangui Ma, Vol. 18, No. 2, 2016, pp. 393-396 Article Full Text PDF |
||
23. | A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach
|
|
Chung-Huei Ling, Wei-Fu Hsien, and Min-Shiang Hwang, Vol. 18, No. 2, 2016, pp. 397-400 Article Full Text PDF |
||