International Journal of Network Security | ||
1. | A Novel One-Time Identity-Password Authenticated Scheme Based on Biometrics for E-coupon System
|
|
Hongfeng Zhu, Yan Zhang and Xiaodan Wang, Vol. 18, No. 3, 2016, pp. 401-409 Article Full Text PDF |
||
2. | A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method
|
|
Fan Li, Qian Mao, Chin-Chen Chang, Vol. 18, No. 3, 2016, pp. 410-419 Article Full Text PDF |
||
3. | Feature Selection for Intrusion Detection System Using Ant Colony Optimization
|
|
Mehdi Hosseinzadeh Aghdam, Peyman Kabiri, Vol. 18, No. 3, 2016, pp. 420-432 Article Full Text PDF |
||
4. | The Policy Mapping Algorithm for High-speed Firewall Policy Verifying
|
|
Suchart Khummanee and Kitt Tientanopajai, Vol. 18, No. 3, 2016, pp. 433-444 Article Full Text PDF |
||
5. | New Random Generator of a Safe Cryptographic Salt Per Session
|
|
Younes Asimi, Abdallah Amghar, Ahmed Asimi, and Yassine Sadqi, Vol. 18, No. 3, 2016, pp. 445-453 Article Full Text PDF |
||
6. | Security Analysis on Secure Untraceable Off-line Electronic Cash System
|
|
Feng Wang, Chin-Chen Chang, and Changlu Lin, Vol. 18, No. 3, 2016, pp. 454-458 Article Full Text PDF |
||
7. | A Taxonomy of Attacks in RPL-based Internet of Things
|
|
Anthea Mayzaud, Remi Badonnel, Isabelle Chrisment, Vol. 18, No. 3, 2016, pp. 459-473 Article Full Text PDF |
||
8. | Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation
|
|
Arindom Ain, Monowar H. Bhuyan, Dhruba K. Bhattacharyya and Jugal K. Kalita, Vol. 18, No. 3, 2016, pp. 474-480 Article Full Text PDF |
||
9. | An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment
|
|
Yilei Wang, Wenyi Bao, Yang Zhao, Hu Xiong, and Zhiguang Qin, Vol. 18, No. 3, 2016, pp. 481-486 Article Full Text PDF |
||
10. | Linear Complexity of a Family of Pseudorandom Discrete Logarithm Threshold Sequences
|
|
Chenhuang Wu, Xiaoni Du, and Zhengtao Jiang, Vol. 18, No. 3, 2016, pp. 487-492 Article Full Text PDF |
||
11. | Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination
|
|
Fangwei Wang, Fang Yang, Changguang Wang, Dongmei Zhao and Yunkai Zhang, Vol. 18, No. 3, 2016, pp. 493-500 Article Full Text PDF |
||
12. | Penetration Testing and Mitigation of Vulnerabilities Windows Server
|
|
Deris Stiawan, Mohd. Yazid Idris, Abdul Hanan Abdullah, Mohammed AlQurashi, Rahmat Budiarto, Vol. 18, No. 3, 2016, pp. 501-513 Article Full Text PDF |
||
13. | A Novel Intrusion Detection System Based on Soft Computing Techniques Using Neuro- Fuzzy Classifier for Packet Dropping Attack in MANETs
|
|
Alka Chauhary, V. N. Tiwari, Anil kumar Dahiya, Vol. 18, No. 3, 2016, pp. 514-522 Article Full Text PDF |
||
14. | Improved Methods and Principles for Designing and Analyzing Security Protocols
|
|
Ali Kartit, Hamza Kamal Idrissi, and Mohamed Belkhouraf, Vol. 18, No. 3, 2016, pp. 523-528 Article Full Text PDF |
||
15. | An Improved Privacy Solution for the Smart Grid
|
|
Mohamad Badra and Sherali Zeadally, Vol. 18, No. 3, 2016, pp. 529-537 Article Full Text PDF |
||
16. | An Improved Lindell-Waisbard Private Web Search Scheme
|
|
Zhengjun Cao, Lihua Liu, Zhenzhen Yan, Vol. 18, No. 3, 2016, pp. 538-543 Article Full Text PDF |
||
17. | A New Digital Signature Scheme from Layered Cellular Automata
|
|
Xing Zhang, Rongxing Lu, Hong Zhang, Chungen Xu, Vol. 18, No. 3, 2016, pp. 544-552 Article Full Text PDF |
||
18. | An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card
|
|
Tanmoy Maitra, Ruhul Amin, Debasis Giri, P. D. Srivastava, Vol. 18, No. 3, 2016, pp. 553-564 Article Full Text PDF |
||
19. | A Study on E-Taiwan Promotion Information Security Governance Programs with E-government Implementation of Information Security Management Standardization
|
|
Chien-Cheng Huang, Kwo-Jean Farn, Vol. 18, No. 3, 2016, pp. 565-578 Article Full Text PDF |
||
20. | SMPR: A Smartphone Based MANET Using Prime Numbers to Enhance the Network-nodes Reachability and Security of Routing Protocols
|
|
Govand Kadir, Torben Kuseler, Ihsan Alshahib Lami, Vol. 18, No. 3, 2016, pp. 579-589 Article Full Text PDF |
||
21. | Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
|
|
Chung-Huei Ling, Shih-Ming Chen, and Min-Shiang Hwang, Vol. 18, No. 3, 2016, pp. 590-593 Article Full Text PDF |
||
22. | Cryptanalysis of a Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems
|
|
Chin-Yu Sun and Ching-Chun Chang, Vol. 18, No. 3, 2016, pp. 594-596 Article Full Text PDF |
||
23. | On the Security of Privacy-preserving Keyword Searching for Cloud Storage Services
|
|
Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Wang, Tzung-Her Chen , Vol. 18, No. 3, 2016, pp. 597-600 Article Full Text PDF |
||