| International Journal of Network Security | ||
| 1. | Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography
|
|
| Hongfeng Zhu, Yifeng Zhang, and Yang Sun, Vol. 18, No. 5, 2016, pp. 803-815 Article Full Text PDF |
||
| 2. | Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks
|
|
| Qing-Qing Xie, Shun-Rong Jiang, Liang-Min Wang, Chin-Chen Chang, Vol. 18, No. 5, 2016, pp. 816-831 Article Full Text PDF |
||
| 3. | A Secure and Robust Image Watermarking System Using Normalization and Arnold Scrambling
|
|
| Dharmalingam Vaishnavi and T. S. Subashini, Vol. 18, No. 5, 2016, pp. 832-841 Article Full Text PDF |
||
| 4. | A Lightweight Threat Detection System for Industrial Wireless Sensor Networks
|
|
| Yosra Ben Saied, Alexis Olivereau, Vol. 18, No. 5, 2016, pp. 842-854 Article Full Text PDF |
||
| 5. | Key Trees Combining Algorithm for Overlapping Resource Access Members
|
|
| Amar Buchade, Rajesh Ingle, Vol. 18, No. 5, 2016, pp. 855-860 Article Full Text PDF |
||
| 6. | Imperceptible Image Authentication Using Wavelets
|
|
| Anirban Goswami and Nabin Ghoshal, Vol. 18, No. 5, 2016, pp. 861-873 Article Full Text PDF |
||
| 7. | Sequential Secret Sharing Scheme Based on Level Ordered Access Structure
|
|
| Dileep Kumar Pattipati, Appala Naidu Tentu, V. Ch. Venkaiah, Allam Appa Rao, Vol. 18, No. 5, 2016, pp. 874-881 Article Full Text PDF |
||
| 8. | The Research on File Encryption Method Based on File Content Partitioning Restructuring
|
|
| Hui Xiao, Hongbin Wang, and Meitong Lin, Vol. 18, No. 5, 2016, pp. 882-887 Article Full Text PDF |
||
| 9. | A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT
|
|
| Osman Wahballa, Abubaker Wahaballa, Fagen Li, Chunxiang Xu, Vol. 18, No. 5, 2016, pp. 888-899 Article Full Text PDF |
||
| 10. | A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage
|
|
| Chi-Wei Liu, Wei-Fu Hsien, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 18, No. 5, 2016, pp. 900-916 Article Full Text PDF |
||
| 11. | A Joint Random Secret Sharing Scheme with Public Verifiability
|
|
| Zhenhua Chen, Shundong Li, Qiong Huang, Jianhua Yan, Yong Ding, Vol. 18, No. 5, 2016, pp. 917-925 Article Full Text PDF |
||
| 12. | Trust Based HWMP Protocol in High-Performance Wireless Mesh Networks
|
|
| Parimalla Subhash and S. Ramachandram, Vol. 18, No. 5, 2016, pp. 926-937 Article Full Text PDF |
||
| 13. | A Strongly Secure Certificateless Digital Signature Scheme in the Random Oracle Model
|
|
| Mohammed Hassouna, Eihab Bashier and Bazara Barry, Vol. 18, No. 5, 2016, pp. 938-945 Article Full Text PDF |
||
| 14. | Group Rekeying Scheme for Dynamic Peer Group Security in Collaborative Networks
|
|
| Depeng Li, Srinivas Sampalli, Vol. 18, No. 5, 2016, pp. 946-959 Article Full Text PDF |
||
| 15. | An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter
|
|
| Rang Zhou, Chunxiang Xu, Wanpeng Li, Jining Zhao, Vol. 18, No. 5, 2016, pp. 960-968 Article Full Text PDF |
||
| 16. | A Computational Review of Identity-based Signcryption Schemes
|
|
| Murari Mandal, Gaurav Sharma, and Anil K. Verma, Vol. 18, No. 5, 2016, pp. 969-977 Article Full Text PDF |
||
| 17. | Analysis of Algorithms for Overlapping Resource Access Members in Cloud Computing
|
|
| Amar Buchade, Rajesh Ingle, Vol. 18, No. 5, 2016, pp. 978-986 Article Full Text PDF |
||
| 18. | On the CLD Attack to a Statistical Model of a Key Stream Generator
|
|
| Shaoquan Jiang, Zailiang Tang, and Mingsheng Wang, Vol. 18, No. 5, 2016, pp. 987-992 Article Full Text PDF |
||
| 19. | Insecurity of a Certificate-free Ad Hoc Anonymous Authentication
|
|
| Yan Xu, Liusheng Huang, Miaomiao Tian, and Hong Zhong, Vol. 18, No. 5, 2016, pp. 993-996 Article Full Text PDF |
||
| 20. | Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics"
|
|
| Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun, Vol. 18, No. 5, 2016, pp. 997-1000 Article Full Text PDF |
||