International Journal of Network Security | ||
1. | Strong Zero-knowledge Authentication Based on Virtual Passwords
|
|
Asimi Ahmed, Asimi Younes, Amghar Abdellah, Yassine Sadqi, Vol. 18, No. 4, 2016, pp. 601-616 Article Full Text PDF |
||
2. | An Integratable Verifiable Secret Sharing Mechanism
|
|
Yanjun Liu, Chin-Chen Chang, Vol. 18, No. 4, 2016, pp. 617-624 Article Full Text PDF |
||
3. | PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users
|
|
Solomon Sarpong, Chunxiang Xu, and Xiaojun Zhang, Vol. 18, No. 4, 2016, pp. 625-632 Article Full Text PDF |
||
4. | Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion
|
|
Biswapati Jana, Debasis Giri and Shyamal Kumar Mondal, Vol. 18, No. 4, 2016, pp. 633-643 Article Full Text PDF |
||
5. | An Improved Automatic Search Method for Differential Trails in TEA Cipher
|
|
Kaihao Chen, Xiaoming Tang, Peng Xu, Man Guo, Weidong Qiu, Zheng Gong, Vol. 18, No. 4, 2016, pp. 644-649 Article Full Text PDF |
||
6. | A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing
|
|
Chi-Wei Liu, Wei-Fu Hsien, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 18, No. 4, 2016, pp. 650-666 Article Full Text PDF |
||
7. | An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols
|
|
Christopher W. Badenhop, Benjamin W. Ramsey, Barry E. Mullins, Vol. 18, No. 4, 2016, pp. 667-677 Article Full Text PDF |
||
8. | Stride Towards Proposing Multi-Modal Biometric Authentication for Online Exam
|
|
A. Prakash, R. Dhanalakshmi, Vol. 18, No. 4, 2016, pp. 678-687 Article Full Text PDF |
||
9. | A Provably Password Authenticated Key Exchange Scheme Based on Chaotic Maps in Different Realm
|
|
Hongfeng Zhu, Yifeng Zhang, and Yan Zhang, Vol. 18, No. 4, 2016, pp. 688-698 Article Full Text PDF |
||
10. | Collaborative IDS Framework for Cloud
|
|
Dinesh Singh, Dhiren Patel, Bhavesh Borisaniya, and Chirag Modi, Vol. 18, No. 4, 2016, pp. 699-709 Article Full Text PDF |
||
11. | Threshold Signature Scheme without Using Polynomial Interpolation
|
|
Lein Harn, Feng Wang, Vol. 18, No. 4, 2016, pp. 710-717 Article Full Text PDF |
||
12. | A Reversible Data Hiding Scheme Based on Histogram Modification in Integer DWT Domain for BTC Compressed Images
|
|
Shun Zhang, Tiegang Gao, Liang Yang, Vol. 18, No. 4, 2016, pp. 718-727 Article Full Text PDF |
||
13. | An Improved Anonymous Buyer-Reseller Watermarking Protocol
|
|
Fuh-Gwo Jeng, Jyun-Ci Huang and Tzung-Her Chen, Vol. 18, No. 4, 2016, pp. 728-735 Article Full Text PDF |
||
14. | Performance Analysis of Location Privacy Preserving Scheme for MANETs
|
|
Bhawani Shanker Bhati, Pallapa Venkataram, Vol. 18, No. 4, 2016, pp. 736-749 Article Full Text PDF |
||
15. | Efficient Pixel Prediction Algorithm for Reversible Data Hiding
|
|
K. Bharanitharan, Chin-Chen Chang, Yang Hai Rui, Zhihui Wang, Vol. 18, No. 4, 2016, pp. 750-757 Article Full Text PDF |
||
16. | Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions
|
|
Krishna Bhowal, Debasree Sarkar, S. Biswas, and Partha Pratim Sarkar, Vol. 18, No. 4, 2016, pp. 758-768 Article Full Text PDF |
||
17. | User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System
|
|
Mohammed Ramadan, Fagen Li, ChunXiang Xu, Abdeldime Mohamed, Hisham Abdalla, Ahmed Abdalla, Vol. 18, No. 4, 2016, pp. 769-781 Article Full Text PDF |
||
18. | Secure and Efficient Smart Card Based Remote User Password Authentication Scheme
|
|
Jianghong Wei, Wenfen Liu, Xuexian Hu, Vol. 18, No. 4, 2016, pp. 782-792 Article Full Text PDF |
||
19. | Cryptanalysis of a Compact Certificateless Aggregate Signature Scheme
|
|
Chih-Cheng Chen, Hanmin Chien, Gwoboa Horng, Vol. 18, No. 4, 2016, pp. 793-797 Article Full Text PDF |
||
20. | Weaknesses of Password Authentication Scheme Based on Geometric Hashing
|
|
Martin Stanek, Vol. 18, No. 4, 2016, pp. 798-801 Article Full Text PDF |
||