Quick Search:

Volume: 18, No: 5 (September 1, 2016)

International Journal of Network Security

1. Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography
Hongfeng Zhu, Yifeng Zhang, and Yang Sun, Vol. 18, No. 5, 2016, pp. 803-815
Article Full Text PDF

2. Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks
Qing-Qing Xie, Shun-Rong Jiang, Liang-Min Wang, Chin-Chen Chang, Vol. 18, No. 5, 2016, pp. 816-831
Article Full Text PDF

3. A Secure and Robust Image Watermarking System Using Normalization and Arnold Scrambling
Dharmalingam Vaishnavi and T. S. Subashini, Vol. 18, No. 5, 2016, pp. 832-841
Article Full Text PDF

4. A Lightweight Threat Detection System for Industrial Wireless Sensor Networks
Yosra Ben Saied, Alexis Olivereau, Vol. 18, No. 5, 2016, pp. 842-854
Article Full Text PDF

5. Key Trees Combining Algorithm for Overlapping Resource Access Members
Amar Buchade, Rajesh Ingle, Vol. 18, No. 5, 2016, pp. 855-860
Article Full Text PDF

6. Imperceptible Image Authentication Using Wavelets
Anirban Goswami and Nabin Ghoshal, Vol. 18, No. 5, 2016, pp. 861-873
Article Full Text PDF

7. Sequential Secret Sharing Scheme Based on Level Ordered Access Structure
Dileep Kumar Pattipati, Appala Naidu Tentu, V. Ch. Venkaiah, Allam Appa Rao, Vol. 18, No. 5, 2016, pp. 874-881
Article Full Text PDF

8. The Research on File Encryption Method Based on File Content Partitioning Restructuring
Hui Xiao, Hongbin Wang, and Meitong Lin, Vol. 18, No. 5, 2016, pp. 882-887
Article Full Text PDF

9. A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT
Osman Wahballa, Abubaker Wahaballa, Fagen Li, Chunxiang Xu, Vol. 18, No. 5, 2016, pp. 888-899
Article Full Text PDF

10. A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage
Chi-Wei Liu, Wei-Fu Hsien, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 18, No. 5, 2016, pp. 900-916
Article Full Text PDF

11. A Joint Random Secret Sharing Scheme with Public Verifiability
Zhenhua Chen, Shundong Li, Qiong Huang, Jianhua Yan, Yong Ding, Vol. 18, No. 5, 2016, pp. 917-925
Article Full Text PDF

12. Trust Based HWMP Protocol in High-Performance Wireless Mesh Networks
Parimalla Subhash and S. Ramachandram, Vol. 18, No. 5, 2016, pp. 926-937
Article Full Text PDF

13. A Strongly Secure Certificateless Digital Signature Scheme in the Random Oracle Model
Mohammed Hassouna, Eihab Bashier and Bazara Barry, Vol. 18, No. 5, 2016, pp. 938-945
Article Full Text PDF

14. Group Rekeying Scheme for Dynamic Peer Group Security in Collaborative Networks
Depeng Li, Srinivas Sampalli, Vol. 18, No. 5, 2016, pp. 946-959
Article Full Text PDF

15. An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter
Rang Zhou, Chunxiang Xu, Wanpeng Li, Jining Zhao, Vol. 18, No. 5, 2016, pp. 960-968
Article Full Text PDF

16. A Computational Review of Identity-based Signcryption Schemes
Murari Mandal, Gaurav Sharma, and Anil K. Verma, Vol. 18, No. 5, 2016, pp. 969-977
Article Full Text PDF

17. Analysis of Algorithms for Overlapping Resource Access Members in Cloud Computing
Amar Buchade, Rajesh Ingle, Vol. 18, No. 5, 2016, pp. 978-986
Article Full Text PDF

18. On the CLD Attack to a Statistical Model of a Key Stream Generator
Shaoquan Jiang, Zailiang Tang, and Mingsheng Wang, Vol. 18, No. 5, 2016, pp. 987-992
Article Full Text PDF

19. Insecurity of a Certificate-free Ad Hoc Anonymous Authentication
Yan Xu, Liusheng Huang, Miaomiao Tian, and Hong Zhong, Vol. 18, No. 5, 2016, pp. 993-996
Article Full Text PDF

20. Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics"
Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun, Vol. 18, No. 5, 2016, pp. 997-1000
Article Full Text PDF