| International Journal of Network Security | ||
| 1. | Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving
|
|
| Hongfeng Zhu, Vol. 18, No. 6, 2016, pp. 1001-1009 Article Full Text PDF |
||
| 2. | An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards
|
|
| Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng, Vol. 18, No. 6, 2016, pp. 1010-1021 Article Full Text PDF |
||
| 3. | A Survey of Data Distortion Watermarking Relational Databases
|
|
| Ming-Ru Xie, Chia-Chun Wu, Jau-Ji Shen, Min-Shiang Hwang, Vol. 18, No. 6, 2016, pp. 1022-1033 Article Full Text PDF |
||
| 4. | Discovering Cyber Terrorism Using Trace Pattern
|
|
| Nurhashikin Mohd Salleh, Siti Rahayu Selamat, Robiah Yusof, Shahrin Sahib, Vol. 18, No. 6, 2016, pp. 1034-1040 Article Full Text PDF |
||
| 5. | Security Extension for Relaxed Trust Requirement in Non3GPP Access to the EPS
|
|
| Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia, Vol. 18, No. 6, 2016, pp. 1041-1053 Article Full Text PDF |
||
| 6. | On Two Kinds of Flaws in Some Server-Aided Verification Schemes
|
|
| Zhengjun Cao, Lihua Liu, Olivier Markowitch, Vol. 18, No. 6, 2016, pp. 1054-1059 Article Full Text PDF |
||
| 7. | A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key
|
|
| Trung Thanh Ngo, Tae-Young Choe, Vol. 18, No. 6, 2016, pp. 1060-1070 Article Full Text PDF |
||
| 8. | Secret Share Based Program Access Authorization Protocol for Smart Metering
|
|
| Xiuxia Tian, Lisha Li, Jinguo Li, Hongjiao Li and Chunhua Gu, Vol. 18, No. 6, 2016, pp. 1071-1079 Article Full Text PDF |
||
| 9. | Secure Authentication Protocol Based on Machine-metrics and RC4-EA Hashing
|
|
| Ashraf Aboshosha, Kamal A. ElDahshan, Eman K. Elsayed, Ahmed A. Elngar, Vol. 18, No. 6, 2016, pp. 1080-1088 Article Full Text PDF |
||
| 10. | Octopus: An Edge-fog Mutual Authentication Scheme
|
|
| Maged Hamada Ibrahim, Vol. 18, No. 6, 2016, pp. 1089-1101 Article Full Text PDF |
||
| 11. | Anti-fake Digital Watermarking Algorithm Based on QR Codes and DWT
|
|
| Jiaohua Qin, Ruxin Sun, Xuyu Xiang, Hao Li, Huajun Huang, Vol. 18, No. 6, 2016, pp. 1102-1108 Article Full Text PDF |
||
| 12. | A Lightweight Generic Compiler for Authenticated Key Exchange from Non-interactive Key Exchange with Auxiliary Input
|
|
| Zheng Yang, Chao Liu, Wanping Liu, Song Luo, Hua Long and Shuangqing Li, Vol. 18, No. 6, 2016, pp. 1109-1121 Article Full Text PDF |
||
| 13. | A High Payload Steganographic Scheme for Compressed Images with Hamming Code
|
|
| Junlan Bai, Chin-Chen Chang, Vol. 18, No. 6, 2016, pp. 1122-1129 Article Full Text PDF |
||
| 14. | Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security
|
|
| Warakorn Srichavengsup, Wimol San-Um, Vol. 18, No. 6, 2016, pp. 1130-1142 Article Full Text PDF |
||
| 15. | An Improved Online/Offline Identity-Based Signature Scheme for WSNs
|
|
| Ya Gao, Peng Zeng, Kim-Kwang Raymond Choo, Fu Song, Vol. 18, No. 6, 2016, pp. 1143-1151 Article Full Text PDF |
||
| 16. | An Efficient and Robust Hybrid Watermarking Scheme for Text-Images
|
|
| Lamri Laouamer, Omar Tayan, Vol. 18, No. 6, 2016, pp. 1152-1158 Article Full Text PDF |
||
| 17. | Anomalies Classification Approach for Network-based Intrusion Detection System
|
|
| Qais Saif Qassim, Abdullah Mohd Zin, Mohd Juzaiddin Ab Aziz, Vol. 18, No. 6, 2016, pp. 1159-1172 Article Full Text PDF |
||
| 18. | An Improved Ownership Transfer and Mutual Authentication for Lightweight RFID Protocols
|
|
| Peng-yu Cui, Vol. 18, No. 6, 2016, pp. 1173-1179 Article Full Text PDF |
||
| 19. | An Automatic Alert Unification Method for Heterogeneous Alert Signatures
|
|
| Ouissem Ben Fredj, Vol. 18, No. 6, 2016, pp. 1180-1191 Article Full Text PDF |
||
| 20. | A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption
|
|
| Qiao Peng, Youliang Tian, Vol. 18, No. 6, 2016, pp. 1192-1200 Article Full Text PDF |
||
| 21. | Reviewer index to volume 18 (2016)
|
|
| Article Full Text PDF | ||