Quick Search:

Volume: 18, No: 2 (March 1, 2016)

International Journal of Network Security

1. A Strong RSA-based and Certificateless-based Signature Scheme
Chin-Chen Chang, Chin-Yu Sun, and Shih-Chang Chang, Vol. 18, No. 2, 2016, pp. 201-208
Article Full Text PDF

2. A Novel Biometrics-based One-Time Commitment Authenticated Key Agreement Scheme with Privacy Protection for Mobile Network
Hongfeng Zhu, Yan Zhang, Haiyang Li, and Lin Lin, Vol. 18, No. 2, 2016, pp. 209-216
Article Full Text PDF

3. A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC
Dianli Guo and Fengtong Wen, Vol. 18, No. 2, 2016, pp. 217-223
Article Full Text PDF

4. Increasing Accuracy and Reliability of IP Traceback for DDoS Attack Using Completion Condition
Samant Saurabh and Ashok Singh Sairam, Vol. 18, No. 2, 2016, pp. 224-234
Article Full Text PDF

5. Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System
Hisham Abdalla, Xiong Hu, Abubaker Wahaballa, Philip Avornyo and Qin Zhiguang, Vol. 18, No. 2, 2016, pp. 235-243
Article Full Text PDF

6. Linear Complexity of Some Binary Interleaved Sequences of Period 4N
Xiao Ma, Tongjiang Yan, Daode Zhang, Yanyan Liu, Vol. 18, No. 2, 2016, pp. 244-249
Article Full Text PDF

7. A New Robust Blind Copyright Protection Scheme Based on Visual Cryptography and Steerable Pyramid
Azz El Arab El Hossaini, Mohamed El Aroussi, Khadija Jamali, Samir Mbarki, and Mohammed Wahbi, Vol. 18, No. 2, 2016, pp. 250-262
Article Full Text PDF

8. Anonymous ID-based Group Key Agreement Protocol without Pairing
Abhimanyu Kumar and Sachin Tripathi, Vol. 18, No. 2, 2016, pp. 263-273
Article Full Text PDF

9. Information Hiding in Standard MIDI Files Based on Velocity Reference Values
Da-Chun Wu, Ming-Yao Chen, Vol. 18, No. 2, 2016, pp. 274-282
Article Full Text PDF

10. Verifiable Delegation of Polynomials
Jun Ye, Haiyan Zhang, and Changyou Fu, Vol. 18, No. 2, 2016, pp. 283-290
Article Full Text PDF

11. Inspired Pseudo Biotic DNA Based Cryptographic Mechanism Against Adaptive Cryptographic Attacks
E. Suresh Babu, C. Naga Raju, and Munaga HM Krishna Prasad, Vol. 18, No. 2, 2016, pp. 291-303
Article Full Text PDF

12. Towards Modelling Perfect Forward Secrecy for One-round Group Key Exchange
Zheng Yang and Daigu Zhang, Vol. 18, No. 2, 2016, pp. 304-315
Article Full Text PDF

13. Inferential SQL Injection Attacks
Miroslav Stampar, Vol. 18, No. 2, 2016, pp. 316-325
Article Full Text PDF

14. Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model
Hongfeng Zhu, Yifeng Zhang, Yu Xia, and Haiyang Li, Vol. 18, No. 2, 2016, pp. 326-334
Article Full Text PDF

15. Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability
Hai-Duong Le, Ngoc-Tu Nguyen, and Chin-Chen Chang, Vol. 18, No. 2, 2016, pp. 335-344
Article Full Text PDF

16. A New Iterative Secret Key Cryptosystem Based on Reversible and Irreversible Cellular Automata
Said Bouchkaren, Saiida Lazaar, Vol. 18, No. 2, 2016, pp. 345-353
Article Full Text PDF

17. A Lightweight RFID Security Protocol Based on Elliptic Curve Cryptography
Quan Qian, Yan-Long Jia, Rui Zhang, Vol. 18, No. 2, 2016, pp. 354-361
Article Full Text PDF

18. Cryptanalysis of an Efficient Password Authentication Scheme
Prasanth Kumar Thandra, J. Rajan, and S. A. V. Satya Murty, Vol. 18, No. 2, 2016, pp. 362-368
Article Full Text PDF

19. On Using Mersenne Primes in Designing Cryptoschemes
Nikolay Andreevich Moldovyan, Alexander Andreevich Moldovyan, Andrey Nikolaevich Berezin, Vol. 18, No. 2, 2016, pp. 369-373
Article Full Text PDF

20. ECPB: Efficient Conditional Privacy-Preserving Authentication Scheme Supporting Batch Verification for VANETs
Yimin Wang, Hong Zhong, Yan Xu, and Jie Cui, Vol. 18, No. 2, 2016, pp. 374-382
Article Full Text PDF

21. A Measurement Study of the Content Security Policy on Real-World Applications
Kailas Patil and Braun Frederik, Vol. 18, No. 2, 2016, pp. 383-392
Article Full Text PDF

22. Attack on An ID-based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
Fushan Wei, Yun Wei, and Chuangui Ma, Vol. 18, No. 2, 2016, pp. 393-396
Article Full Text PDF

23. A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach
Chung-Huei Ling, Wei-Fu Hsien, and Min-Shiang Hwang, Vol. 18, No. 2, 2016, pp. 397-400
Article Full Text PDF