International Journal of Network Security | ||
1. | Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography
|
|
Hongfeng Zhu, Yifeng Zhang, and Yang Sun, Vol. 18, No. 5, 2016, pp. 803-815 Article Full Text PDF |
||
2. | Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks
|
|
Qing-Qing Xie, Shun-Rong Jiang, Liang-Min Wang, Chin-Chen Chang, Vol. 18, No. 5, 2016, pp. 816-831 Article Full Text PDF |
||
3. | A Secure and Robust Image Watermarking System Using Normalization and Arnold Scrambling
|
|
Dharmalingam Vaishnavi and T. S. Subashini, Vol. 18, No. 5, 2016, pp. 832-841 Article Full Text PDF |
||
4. | A Lightweight Threat Detection System for Industrial Wireless Sensor Networks
|
|
Yosra Ben Saied, Alexis Olivereau, Vol. 18, No. 5, 2016, pp. 842-854 Article Full Text PDF |
||
5. | Key Trees Combining Algorithm for Overlapping Resource Access Members
|
|
Amar Buchade, Rajesh Ingle, Vol. 18, No. 5, 2016, pp. 855-860 Article Full Text PDF |
||
6. | Imperceptible Image Authentication Using Wavelets
|
|
Anirban Goswami and Nabin Ghoshal, Vol. 18, No. 5, 2016, pp. 861-873 Article Full Text PDF |
||
7. | Sequential Secret Sharing Scheme Based on Level Ordered Access Structure
|
|
Dileep Kumar Pattipati, Appala Naidu Tentu, V. Ch. Venkaiah, Allam Appa Rao, Vol. 18, No. 5, 2016, pp. 874-881 Article Full Text PDF |
||
8. | The Research on File Encryption Method Based on File Content Partitioning Restructuring
|
|
Hui Xiao, Hongbin Wang, and Meitong Lin, Vol. 18, No. 5, 2016, pp. 882-887 Article Full Text PDF |
||
9. | A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT
|
|
Osman Wahballa, Abubaker Wahaballa, Fagen Li, Chunxiang Xu, Vol. 18, No. 5, 2016, pp. 888-899 Article Full Text PDF |
||
10. | A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage
|
|
Chi-Wei Liu, Wei-Fu Hsien, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 18, No. 5, 2016, pp. 900-916 Article Full Text PDF |
||
11. | A Joint Random Secret Sharing Scheme with Public Verifiability
|
|
Zhenhua Chen, Shundong Li, Qiong Huang, Jianhua Yan, Yong Ding, Vol. 18, No. 5, 2016, pp. 917-925 Article Full Text PDF |
||
12. | Trust Based HWMP Protocol in High-Performance Wireless Mesh Networks
|
|
Parimalla Subhash and S. Ramachandram, Vol. 18, No. 5, 2016, pp. 926-937 Article Full Text PDF |
||
13. | A Strongly Secure Certificateless Digital Signature Scheme in the Random Oracle Model
|
|
Mohammed Hassouna, Eihab Bashier and Bazara Barry, Vol. 18, No. 5, 2016, pp. 938-945 Article Full Text PDF |
||
14. | Group Rekeying Scheme for Dynamic Peer Group Security in Collaborative Networks
|
|
Depeng Li, Srinivas Sampalli, Vol. 18, No. 5, 2016, pp. 946-959 Article Full Text PDF |
||
15. | An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter
|
|
Rang Zhou, Chunxiang Xu, Wanpeng Li, Jining Zhao, Vol. 18, No. 5, 2016, pp. 960-968 Article Full Text PDF |
||
16. | A Computational Review of Identity-based Signcryption Schemes
|
|
Murari Mandal, Gaurav Sharma, and Anil K. Verma, Vol. 18, No. 5, 2016, pp. 969-977 Article Full Text PDF |
||
17. | Analysis of Algorithms for Overlapping Resource Access Members in Cloud Computing
|
|
Amar Buchade, Rajesh Ingle, Vol. 18, No. 5, 2016, pp. 978-986 Article Full Text PDF |
||
18. | On the CLD Attack to a Statistical Model of a Key Stream Generator
|
|
Shaoquan Jiang, Zailiang Tang, and Mingsheng Wang, Vol. 18, No. 5, 2016, pp. 987-992 Article Full Text PDF |
||
19. | Insecurity of a Certificate-free Ad Hoc Anonymous Authentication
|
|
Yan Xu, Liusheng Huang, Miaomiao Tian, and Hong Zhong, Vol. 18, No. 5, 2016, pp. 993-996 Article Full Text PDF |
||
20. | Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics"
|
|
Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun, Vol. 18, No. 5, 2016, pp. 997-1000 Article Full Text PDF |
||