| International Journal of Network Security | ||
| 1. | A Novel One-Time Identity-Password Authenticated Scheme Based on Biometrics for E-coupon System
|
|
| Hongfeng Zhu, Yan Zhang and Xiaodan Wang, Vol. 18, No. 3, 2016, pp. 401-409 Article Full Text PDF |
||
| 2. | A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method
|
|
| Fan Li, Qian Mao, Chin-Chen Chang, Vol. 18, No. 3, 2016, pp. 410-419 Article Full Text PDF |
||
| 3. | Feature Selection for Intrusion Detection System Using Ant Colony Optimization
|
|
| Mehdi Hosseinzadeh Aghdam, Peyman Kabiri, Vol. 18, No. 3, 2016, pp. 420-432 Article Full Text PDF |
||
| 4. | The Policy Mapping Algorithm for High-speed Firewall Policy Verifying
|
|
| Suchart Khummanee and Kitt Tientanopajai, Vol. 18, No. 3, 2016, pp. 433-444 Article Full Text PDF |
||
| 5. | New Random Generator of a Safe Cryptographic Salt Per Session
|
|
| Younes Asimi, Abdallah Amghar, Ahmed Asimi, and Yassine Sadqi, Vol. 18, No. 3, 2016, pp. 445-453 Article Full Text PDF |
||
| 6. | Security Analysis on Secure Untraceable Off-line Electronic Cash System
|
|
| Feng Wang, Chin-Chen Chang, and Changlu Lin, Vol. 18, No. 3, 2016, pp. 454-458 Article Full Text PDF |
||
| 7. | A Taxonomy of Attacks in RPL-based Internet of Things
|
|
| Anthea Mayzaud, Remi Badonnel, Isabelle Chrisment, Vol. 18, No. 3, 2016, pp. 459-473 Article Full Text PDF |
||
| 8. | Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation
|
|
| Arindom Ain, Monowar H. Bhuyan, Dhruba K. Bhattacharyya and Jugal K. Kalita, Vol. 18, No. 3, 2016, pp. 474-480 Article Full Text PDF |
||
| 9. | An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment
|
|
| Yilei Wang, Wenyi Bao, Yang Zhao, Hu Xiong, and Zhiguang Qin, Vol. 18, No. 3, 2016, pp. 481-486 Article Full Text PDF |
||
| 10. | Linear Complexity of a Family of Pseudorandom Discrete Logarithm Threshold Sequences
|
|
| Chenhuang Wu, Xiaoni Du, and Zhengtao Jiang, Vol. 18, No. 3, 2016, pp. 487-492 Article Full Text PDF |
||
| 11. | Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination
|
|
| Fangwei Wang, Fang Yang, Changguang Wang, Dongmei Zhao and Yunkai Zhang, Vol. 18, No. 3, 2016, pp. 493-500 Article Full Text PDF |
||
| 12. | Penetration Testing and Mitigation of Vulnerabilities Windows Server
|
|
| Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdullah, Mohammed AlQurashi, Rahmat Budiarto, Vol. 18, No. 3, 2016, pp. 501-513 Article Full Text PDF |
||
| 13. | A Novel Intrusion Detection System Based on Soft Computing Techniques Using Neuro- Fuzzy Classifier for Packet Dropping Attack in MANETs
|
|
| Alka Chauhary, V. N. Tiwari, Anil kumar Dahiya, Vol. 18, No. 3, 2016, pp. 514-522 Article Full Text PDF |
||
| 14. | Improved Methods and Principles for Designing and Analyzing Security Protocols
|
|
| Ali Kartit, Hamza Kamal Idrissi, and Mohamed Belkhouraf, Vol. 18, No. 3, 2016, pp. 523-528 Article Full Text PDF |
||
| 15. | An Improved Privacy Solution for the Smart Grid
|
|
| Mohamad Badra and Sherali Zeadally, Vol. 18, No. 3, 2016, pp. 529-537 Article Full Text PDF |
||
| 16. | An Improved Lindell-Waisbard Private Web Search Scheme
|
|
| Zhengjun Cao, Lihua Liu, Zhenzhen Yan, Vol. 18, No. 3, 2016, pp. 538-543 Article Full Text PDF |
||
| 17. | A New Digital Signature Scheme from Layered Cellular Automata
|
|
| Xing Zhang, Rongxing Lu, Hong Zhang, Chungen Xu, Vol. 18, No. 3, 2016, pp. 544-552 Article Full Text PDF |
||
| 18. | An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card
|
|
| Tanmoy Maitra, Ruhul Amin, Debasis Giri, P. D. Srivastava, Vol. 18, No. 3, 2016, pp. 553-564 Article Full Text PDF |
||
| 19. | A Study on E-Taiwan Promotion Information Security Governance Programs with E-government Implementation of Information Security Management Standardization
|
|
| Chien-Cheng Huang, Kwo-Jean Farn, Vol. 18, No. 3, 2016, pp. 565-578 Article Full Text PDF |
||
| 20. | SMPR: A Smartphone Based MANET Using Prime Numbers to Enhance the Network-nodes Reachability and Security of Routing Protocols
|
|
| Govand Kadir, Torben Kuseler, Ihsan Alshahib Lami, Vol. 18, No. 3, 2016, pp. 579-589 Article Full Text PDF |
||
| 21. | Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
|
|
| Chung-Huei Ling, Shih-Ming Chen, and Min-Shiang Hwang, Vol. 18, No. 3, 2016, pp. 590-593 Article Full Text PDF |
||
| 22. | Cryptanalysis of a Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems
|
|
| Chin-Yu Sun and Ching-Chun Chang, Vol. 18, No. 3, 2016, pp. 594-596 Article Full Text PDF |
||
| 23. | On the Security of Privacy-preserving Keyword Searching for Cloud Storage Services
|
|
| Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Wang, Tzung-Her Chen , Vol. 18, No. 3, 2016, pp. 597-600 Article Full Text PDF |
||