Quick Search:

Volume: 18, No: 4 (July 1, 2016)

International Journal of Network Security

1. Strong Zero-knowledge Authentication Based on Virtual Passwords
Asimi Ahmed, Asimi Younes, Amghar Abdellah, Yassine Sadqi, Vol. 18, No. 4, 2016, pp. 601-616
Article Full Text PDF

2. An Integratable Verifiable Secret Sharing Mechanism
Yanjun Liu, Chin-Chen Chang, Vol. 18, No. 4, 2016, pp. 617-624
Article Full Text PDF

3. PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users
Solomon Sarpong, Chunxiang Xu, and Xiaojun Zhang, Vol. 18, No. 4, 2016, pp. 625-632
Article Full Text PDF

4. Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion
Biswapati Jana, Debasis Giri and Shyamal Kumar Mondal, Vol. 18, No. 4, 2016, pp. 633-643
Article Full Text PDF

5. An Improved Automatic Search Method for Differential Trails in TEA Cipher
Kaihao Chen, Xiaoming Tang, Peng Xu, Man Guo, Weidong Qiu, Zheng Gong, Vol. 18, No. 4, 2016, pp. 644-649
Article Full Text PDF

6. A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing
Chi-Wei Liu, Wei-Fu Hsien, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 18, No. 4, 2016, pp. 650-666
Article Full Text PDF

7. An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols
Christopher W. Badenhop, Benjamin W. Ramsey, Barry E. Mullins, Vol. 18, No. 4, 2016, pp. 667-677
Article Full Text PDF

8. Stride Towards Proposing Multi-Modal Biometric Authentication for Online Exam
A. Prakash, R. Dhanalakshmi, Vol. 18, No. 4, 2016, pp. 678-687
Article Full Text PDF

9. A Provably Password Authenticated Key Exchange Scheme Based on Chaotic Maps in Different Realm
Hongfeng Zhu, Yifeng Zhang, and Yan Zhang, Vol. 18, No. 4, 2016, pp. 688-698
Article Full Text PDF

10. Collaborative IDS Framework for Cloud
Dinesh Singh, Dhiren Patel, Bhavesh Borisaniya, and Chirag Modi, Vol. 18, No. 4, 2016, pp. 699-709
Article Full Text PDF

11. Threshold Signature Scheme without Using Polynomial Interpolation
Lein Harn, Feng Wang, Vol. 18, No. 4, 2016, pp. 710-717
Article Full Text PDF

12. A Reversible Data Hiding Scheme Based on Histogram Modification in Integer DWT Domain for BTC Compressed Images
Shun Zhang, Tiegang Gao, Liang Yang, Vol. 18, No. 4, 2016, pp. 718-727
Article Full Text PDF

13. An Improved Anonymous Buyer-Reseller Watermarking Protocol
Fuh-Gwo Jeng, Jyun-Ci Huang and Tzung-Her Chen, Vol. 18, No. 4, 2016, pp. 728-735
Article Full Text PDF

14. Performance Analysis of Location Privacy Preserving Scheme for MANETs
Bhawani Shanker Bhati, Pallapa Venkataram, Vol. 18, No. 4, 2016, pp. 736-749
Article Full Text PDF

15. Efficient Pixel Prediction Algorithm for Reversible Data Hiding
K. Bharanitharan, Chin-Chen Chang, Yang Hai Rui, Zhihui Wang, Vol. 18, No. 4, 2016, pp. 750-757
Article Full Text PDF

16. Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions
Krishna Bhowal, Debasree Sarkar, S. Biswas, and Partha Pratim Sarkar, Vol. 18, No. 4, 2016, pp. 758-768
Article Full Text PDF

17. User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System
Mohammed Ramadan, Fagen Li, ChunXiang Xu, Abdeldime Mohamed, Hisham Abdalla, Ahmed Abdalla, Vol. 18, No. 4, 2016, pp. 769-781
Article Full Text PDF

18. Secure and Efficient Smart Card Based Remote User Password Authentication Scheme
Jianghong Wei, Wenfen Liu, Xuexian Hu, Vol. 18, No. 4, 2016, pp. 782-792
Article Full Text PDF

19. Cryptanalysis of a Compact Certificateless Aggregate Signature Scheme
Chih-Cheng Chen, Hanmin Chien, Gwoboa Horng, Vol. 18, No. 4, 2016, pp. 793-797
Article Full Text PDF

20. Weaknesses of Password Authentication Scheme Based on Geometric Hashing
Martin Stanek, Vol. 18, No. 4, 2016, pp. 798-801
Article Full Text PDF