Quick Search:

Volume: 18, No: 3 (May 1, 2016)

International Journal of Network Security

1. A Novel One-Time Identity-Password Authenticated Scheme Based on Biometrics for E-coupon System
Hongfeng Zhu, Yan Zhang and Xiaodan Wang, Vol. 18, No. 3, 2016, pp. 401-409
Article Full Text PDF

2. A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method
Fan Li, Qian Mao, Chin-Chen Chang, Vol. 18, No. 3, 2016, pp. 410-419
Article Full Text PDF

3. Feature Selection for Intrusion Detection System Using Ant Colony Optimization
Mehdi Hosseinzadeh Aghdam, Peyman Kabiri, Vol. 18, No. 3, 2016, pp. 420-432
Article Full Text PDF

4. The Policy Mapping Algorithm for High-speed Firewall Policy Verifying
Suchart Khummanee and Kitt Tientanopajai, Vol. 18, No. 3, 2016, pp. 433-444
Article Full Text PDF

5. New Random Generator of a Safe Cryptographic Salt Per Session
Younes Asimi, Abdallah Amghar, Ahmed Asimi, and Yassine Sadqi, Vol. 18, No. 3, 2016, pp. 445-453
Article Full Text PDF

6. Security Analysis on Secure Untraceable Off-line Electronic Cash System
Feng Wang, Chin-Chen Chang, and Changlu Lin, Vol. 18, No. 3, 2016, pp. 454-458
Article Full Text PDF

7. A Taxonomy of Attacks in RPL-based Internet of Things
Anthea Mayzaud, Remi Badonnel, Isabelle Chrisment, Vol. 18, No. 3, 2016, pp. 459-473
Article Full Text PDF

8. Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation
Arindom Ain, Monowar H. Bhuyan, Dhruba K. Bhattacharyya and Jugal K. Kalita, Vol. 18, No. 3, 2016, pp. 474-480
Article Full Text PDF

9. An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment
Yilei Wang, Wenyi Bao, Yang Zhao, Hu Xiong, and Zhiguang Qin, Vol. 18, No. 3, 2016, pp. 481-486
Article Full Text PDF

10. Linear Complexity of a Family of Pseudorandom Discrete Logarithm Threshold Sequences
Chenhuang Wu, Xiaoni Du, and Zhengtao Jiang, Vol. 18, No. 3, 2016, pp. 487-492
Article Full Text PDF

11. Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination
Fangwei Wang, Fang Yang, Changguang Wang, Dongmei Zhao and Yunkai Zhang, Vol. 18, No. 3, 2016, pp. 493-500
Article Full Text PDF

12. Penetration Testing and Mitigation of Vulnerabilities Windows Server
Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdullah, Mohammed AlQurashi, Rahmat Budiarto, Vol. 18, No. 3, 2016, pp. 501-513
Article Full Text PDF

13. A Novel Intrusion Detection System Based on Soft Computing Techniques Using Neuro- Fuzzy Classifier for Packet Dropping Attack in MANETs
Alka Chauhary, V. N. Tiwari, Anil kumar Dahiya, Vol. 18, No. 3, 2016, pp. 514-522
Article Full Text PDF

14. Improved Methods and Principles for Designing and Analyzing Security Protocols
Ali Kartit, Hamza Kamal Idrissi, and Mohamed Belkhouraf, Vol. 18, No. 3, 2016, pp. 523-528
Article Full Text PDF

15. An Improved Privacy Solution for the Smart Grid
Mohamad Badra and Sherali Zeadally, Vol. 18, No. 3, 2016, pp. 529-537
Article Full Text PDF

16. An Improved Lindell-Waisbard Private Web Search Scheme
Zhengjun Cao, Lihua Liu, Zhenzhen Yan, Vol. 18, No. 3, 2016, pp. 538-543
Article Full Text PDF

17. A New Digital Signature Scheme from Layered Cellular Automata
Xing Zhang, Rongxing Lu, Hong Zhang, Chungen Xu, Vol. 18, No. 3, 2016, pp. 544-552
Article Full Text PDF

18. An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card
Tanmoy Maitra, Ruhul Amin, Debasis Giri, P. D. Srivastava, Vol. 18, No. 3, 2016, pp. 553-564
Article Full Text PDF

19. A Study on E-Taiwan Promotion Information Security Governance Programs with E-government Implementation of Information Security Management Standardization
Chien-Cheng Huang, Kwo-Jean Farn, Vol. 18, No. 3, 2016, pp. 565-578
Article Full Text PDF

20. SMPR: A Smartphone Based MANET Using Prime Numbers to Enhance the Network-nodes Reachability and Security of Routing Protocols
Govand Kadir, Torben Kuseler, Ihsan Alshahib Lami, Vol. 18, No. 3, 2016, pp. 579-589
Article Full Text PDF

21. Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
Chung-Huei Ling, Shih-Ming Chen, and Min-Shiang Hwang, Vol. 18, No. 3, 2016, pp. 590-593
Article Full Text PDF

22. Cryptanalysis of a Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems
Chin-Yu Sun and Ching-Chun Chang, Vol. 18, No. 3, 2016, pp. 594-596
Article Full Text PDF

23. On the Security of Privacy-preserving Keyword Searching for Cloud Storage Services
Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Wang, Tzung-Her Chen , Vol. 18, No. 3, 2016, pp. 597-600
Article Full Text PDF