Quick Search:

Volume: 18, No: 6 (November 1, 2016)

International Journal of Network Security

1. Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving
Hongfeng Zhu, Vol. 18, No. 6, 2016, pp. 1001-1009
Article Full Text PDF

2. An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards
Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng, Vol. 18, No. 6, 2016, pp. 1010-1021
Article Full Text PDF

3. A Survey of Data Distortion Watermarking Relational Databases
Ming-Ru Xie, Chia-Chun Wu, Jau-Ji Shen, Min-Shiang Hwang, Vol. 18, No. 6, 2016, pp. 1022-1033
Article Full Text PDF

4. Discovering Cyber Terrorism Using Trace Pattern
Nurhashikin Mohd Salleh, Siti Rahayu Selamat, Robiah Yusof, Shahrin Sahib, Vol. 18, No. 6, 2016, pp. 1034-1040
Article Full Text PDF

5. Security Extension for Relaxed Trust Requirement in Non3GPP Access to the EPS
Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia, Vol. 18, No. 6, 2016, pp. 1041-1053
Article Full Text PDF

6. On Two Kinds of Flaws in Some Server-Aided Verification Schemes
Zhengjun Cao, Lihua Liu, Olivier Markowitch, Vol. 18, No. 6, 2016, pp. 1054-1059
Article Full Text PDF

7. A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key
Trung Thanh Ngo, Tae-Young Choe, Vol. 18, No. 6, 2016, pp. 1060-1070
Article Full Text PDF

8. Secret Share Based Program Access Authorization Protocol for Smart Metering
Xiuxia Tian, Lisha Li, Jinguo Li, Hongjiao Li and Chunhua Gu, Vol. 18, No. 6, 2016, pp. 1071-1079
Article Full Text PDF

9. Secure Authentication Protocol Based on Machine-metrics and RC4-EA Hashing
Ashraf Aboshosha, Kamal A. ElDahshan, Eman K. Elsayed, Ahmed A. Elngar, Vol. 18, No. 6, 2016, pp. 1080-1088
Article Full Text PDF

10. Octopus: An Edge-fog Mutual Authentication Scheme
Maged Hamada Ibrahim, Vol. 18, No. 6, 2016, pp. 1089-1101
Article Full Text PDF

11. Anti-fake Digital Watermarking Algorithm Based on QR Codes and DWT
Jiaohua Qin, Ruxin Sun, Xuyu Xiang, Hao Li, Huajun Huang, Vol. 18, No. 6, 2016, pp. 1102-1108
Article Full Text PDF

12. A Lightweight Generic Compiler for Authenticated Key Exchange from Non-interactive Key Exchange with Auxiliary Input
Zheng Yang, Chao Liu, Wanping Liu, Song Luo, Hua Long and Shuangqing Li, Vol. 18, No. 6, 2016, pp. 1109-1121
Article Full Text PDF

13. A High Payload Steganographic Scheme for Compressed Images with Hamming Code
Junlan Bai, Chin-Chen Chang, Vol. 18, No. 6, 2016, pp. 1122-1129
Article Full Text PDF

14. Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security
Warakorn Srichavengsup, Wimol San-Um, Vol. 18, No. 6, 2016, pp. 1130-1142
Article Full Text PDF

15. An Improved Online/Offline Identity-Based Signature Scheme for WSNs
Ya Gao, Peng Zeng, Kim-Kwang Raymond Choo, Fu Song, Vol. 18, No. 6, 2016, pp. 1143-1151
Article Full Text PDF

16. An Efficient and Robust Hybrid Watermarking Scheme for Text-Images
Lamri Laouamer, Omar Tayan, Vol. 18, No. 6, 2016, pp. 1152-1158
Article Full Text PDF

17. Anomalies Classification Approach for Network-based Intrusion Detection System
Qais Saif Qassim, Abdullah Mohd Zin, Mohd Juzaiddin Ab Aziz, Vol. 18, No. 6, 2016, pp. 1159-1172
Article Full Text PDF

18. An Improved Ownership Transfer and Mutual Authentication for Lightweight RFID Protocols
Peng-yu Cui, Vol. 18, No. 6, 2016, pp. 1173-1179
Article Full Text PDF

19. An Automatic Alert Unification Method for Heterogeneous Alert Signatures
Ouissem Ben Fredj, Vol. 18, No. 6, 2016, pp. 1180-1191
Article Full Text PDF

20. A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption
Qiao Peng, Youliang Tian, Vol. 18, No. 6, 2016, pp. 1192-1200
Article Full Text PDF

21. Reviewer index to volume 18 (2016)
Article Full Text PDF