Quick Search:

Volume: 19, No: 1 (January 1, 2017)

International Journal of Network Security

1. An Efficient and Secure Smart Card Based Password Authentication Scheme
Yanjun Liu, Chin-Chen Chang and Shih-Chang Chang, Vol. 19, No. 1, 2017, pp. 1-10
Article Full Text PDF

2. A Homomorphic Universal Re-encryptor for Identity-based Encryption
Liang Liu, Jun Ye, Vol. 19, No. 1, 2017, pp. 11-19
Article Full Text PDF

3. An SVEIR Defending Model with Partial Immunization for Worms
Fangwei Wang, Hongfeng Gao, Yong Yang, Changguang Wang, Vol. 19, No. 1, 2017, pp. 20-26
Article Full Text PDF

4. Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme
Hisham Abdalla, Xiong Hu, Abubaker Wahaballa, Ahmed Abdalla, Mohammed Ramadan and Qin Zhiguang, Vol. 19, No. 1, 2017, pp. 27-38
Article Full Text PDF

5. An Improved Privacy Protection Security Protocol Based on NFC
Jie Ling, Ying Wang, Weifeng Chen, Vol. 19, No. 1, 2017, pp. 39-46
Article Full Text PDF

6. Mojette (d) Secret Image “SEDIH” in an Encrypted Double Image – A Histo Approach
Padmapriya Praveenkumar, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan, Vol. 19, No. 1, 2017, pp. 47-59
Article Full Text PDF

7. SMP: Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks
Kuo-Jui Wei, Jung-San Lee, and Bo Li, Vol. 19, No. 1, 2017, pp. 60-71
Article Full Text PDF

8. High-speed Firewall Rule Verification with O(1) Worst-case Access Time
Suchart Khummanee, Kitt Tientanopajai, Vol. 19, No. 1, 2017, pp. 72-84
Article Full Text PDF

9. A Novel Micropayment Scheme with Variable Denomination
Quan-Yu Zhao, Yi-Ning Liu, Gao Liu, Chin-Chen Chang, Vol. 19, No. 1, 2017, pp. 85-90
Article Full Text PDF

10. The Paillier's Cryptosystem and Some Variants Revisited
Zhengjun Cao, Lihua Liu, Vol. 19, No. 1, 2017, pp. 91-98
Article Full Text PDF

11. An Improvement of Fermat's Factorization by Considering the Last m Digits of Modulus to Decrease Computation Time
Kritsanapong Somsuk, Kitt Tientanopajai, Vol. 19, No. 1, 2017, pp. 99-111
Article Full Text PDF

12. Using a New Structure in Group Key Management for Pay-TV
Shih-Ming Chen, Ching-Rong Yang, and Min-Shiang Hwang, Vol. 19, No. 1, 2017, pp. 112-117
Article Full Text PDF

13. A Public-Key Approach of Selective Encryption for Images
Feng Jiang, Paul Salama, Brian King, Vol. 19, No. 1, 2017, pp. 118-126
Article Full Text PDF

14. An Efficient ID-based Online/Offline Signature Scheme without Key Escrow
Dan Liu, Shun Zhang, Hong Zhong, Runhua Shi, and Yimin Wang, Vol. 19, No. 1, 2017, pp. 127-137
Article Full Text PDF

15. Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model
Bo Meng, Chin-Tser Huang, Yitong Yang, Leyuan Niu, Dejun Wang , Vol. 19, No. 1, 2017, pp. 138-153
Article Full Text PDF

16. Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization
Qiang Jin, Zhihong Li, Chin-Chen Chang, Anhong Wang, Li Liu, Vol. 19, No. 1, 2017, pp. 154-162
Article Full Text PDF

17. Social Bots Detection on Mobile Social Networks
Cheng Binlin, Fu Jianming, Vol. 19, No. 1, 2017, pp. 163-166
Article Full Text PDF

18. Subject index to volume 19 (2017)
Article Full Text PDF

19. Author index to volume 19 (2017)
Article Full Text PDF

20. Reviewer index to volume 19 (2017)
Article Full Text PDF

21. All Papers to volume 19 (2017)
Article Full Text PDF