International Journal of Network Security | ||
1. | Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving
|
|
Hongfeng Zhu, Vol. 18, No. 6, 2016, pp. 1001-1009 Article Full Text PDF |
||
2. | An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards
|
|
Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng, Vol. 18, No. 6, 2016, pp. 1010-1021 Article Full Text PDF |
||
3. | A Survey of Data Distortion Watermarking Relational Databases
|
|
Ming-Ru Xie, Chia-Chun Wu, Jau-Ji Shen, Min-Shiang Hwang, Vol. 18, No. 6, 2016, pp. 1022-1033 Article Full Text PDF |
||
4. | Discovering Cyber Terrorism Using Trace Pattern
|
|
Nurhashikin Mohd Salleh, Siti Rahayu Selamat, Robiah Yusof, Shahrin Sahib, Vol. 18, No. 6, 2016, pp. 1034-1040 Article Full Text PDF |
||
5. | Security Extension for Relaxed Trust Requirement in Non3GPP Access to the EPS
|
|
Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia, Vol. 18, No. 6, 2016, pp. 1041-1053 Article Full Text PDF |
||
6. | On Two Kinds of Flaws in Some Server-Aided Verification Schemes
|
|
Zhengjun Cao, Lihua Liu, Olivier Markowitch, Vol. 18, No. 6, 2016, pp. 1054-1059 Article Full Text PDF |
||
7. | A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key
|
|
Trung Thanh Ngo, Tae-Young Choe, Vol. 18, No. 6, 2016, pp. 1060-1070 Article Full Text PDF |
||
8. | Secret Share Based Program Access Authorization Protocol for Smart Metering
|
|
Xiuxia Tian, Lisha Li, Jinguo Li, Hongjiao Li and Chunhua Gu, Vol. 18, No. 6, 2016, pp. 1071-1079 Article Full Text PDF |
||
9. | Secure Authentication Protocol Based on Machine-metrics and RC4-EA Hashing
|
|
Ashraf Aboshosha, Kamal A. ElDahshan, Eman K. Elsayed, Ahmed A. Elngar, Vol. 18, No. 6, 2016, pp. 1080-1088 Article Full Text PDF |
||
10. | Octopus: An Edge-fog Mutual Authentication Scheme
|
|
Maged Hamada Ibrahim, Vol. 18, No. 6, 2016, pp. 1089-1101 Article Full Text PDF |
||
11. | Anti-fake Digital Watermarking Algorithm Based on QR Codes and DWT
|
|
Jiaohua Qin, Ruxin Sun, Xuyu Xiang, Hao Li, Huajun Huang, Vol. 18, No. 6, 2016, pp. 1102-1108 Article Full Text PDF |
||
12. | A Lightweight Generic Compiler for Authenticated Key Exchange from Non-interactive Key Exchange with Auxiliary Input
|
|
Zheng Yang, Chao Liu, Wanping Liu, Song Luo, Hua Long and Shuangqing Li, Vol. 18, No. 6, 2016, pp. 1109-1121 Article Full Text PDF |
||
13. | A High Payload Steganographic Scheme for Compressed Images with Hamming Code
|
|
Junlan Bai, Chin-Chen Chang, Vol. 18, No. 6, 2016, pp. 1122-1129 Article Full Text PDF |
||
14. | Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security
|
|
Warakorn Srichavengsup, Wimol San-Um, Vol. 18, No. 6, 2016, pp. 1130-1142 Article Full Text PDF |
||
15. | An Improved Online/Offline Identity-Based Signature Scheme for WSNs
|
|
Ya Gao, Peng Zeng, Kim-Kwang Raymond Choo, Fu Song, Vol. 18, No. 6, 2016, pp. 1143-1151 Article Full Text PDF |
||
16. | An Efficient and Robust Hybrid Watermarking Scheme for Text-Images
|
|
Lamri Laouamer, Omar Tayan, Vol. 18, No. 6, 2016, pp. 1152-1158 Article Full Text PDF |
||
17. | Anomalies Classification Approach for Network-based Intrusion Detection System
|
|
Qais Saif Qassim, Abdullah Mohd Zin, Mohd Juzaiddin Ab Aziz, Vol. 18, No. 6, 2016, pp. 1159-1172 Article Full Text PDF |
||
18. | An Improved Ownership Transfer and Mutual Authentication for Lightweight RFID Protocols
|
|
Peng-yu Cui, Vol. 18, No. 6, 2016, pp. 1173-1179 Article Full Text PDF |
||
19. | An Automatic Alert Unification Method for Heterogeneous Alert Signatures
|
|
Ouissem Ben Fredj, Vol. 18, No. 6, 2016, pp. 1180-1191 Article Full Text PDF |
||
20. | A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption
|
|
Qiao Peng, Youliang Tian, Vol. 18, No. 6, 2016, pp. 1192-1200 Article Full Text PDF |
||
21. | Reviewer index to volume 18 (2016)
|
|
Article Full Text PDF | ||