International Journal of Network Security | ||
1. | An Efficient and Secure Smart Card Based Password Authentication Scheme
|
|
Yanjun Liu, Chin-Chen Chang and Shih-Chang Chang, Vol. 19, No. 1, 2017, pp. 1-10 Article Full Text PDF |
||
2. | A Homomorphic Universal Re-encryptor for Identity-based Encryption
|
|
Liang Liu, Jun Ye, Vol. 19, No. 1, 2017, pp. 11-19 Article Full Text PDF |
||
3. | An SVEIR Defending Model with Partial Immunization for Worms
|
|
Fangwei Wang, Hongfeng Gao, Yong Yang, Changguang Wang, Vol. 19, No. 1, 2017, pp. 20-26 Article Full Text PDF |
||
4. | Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme
|
|
Hisham Abdalla, Xiong Hu, Abubaker Wahaballa, Ahmed Abdalla, Mohammed Ramadan and Qin Zhiguang, Vol. 19, No. 1, 2017, pp. 27-38 Article Full Text PDF |
||
5. | An Improved Privacy Protection Security Protocol Based on NFC
|
|
Jie Ling, Ying Wang, Weifeng Chen, Vol. 19, No. 1, 2017, pp. 39-46 Article Full Text PDF |
||
6. | Mojette (d) Secret Image “SEDIH” in an Encrypted Double Image – A Histo Approach
|
|
Padmapriya Praveenkumar, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan, Vol. 19, No. 1, 2017, pp. 47-59 Article Full Text PDF |
||
7. | SMP: Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks
|
|
Kuo-Jui Wei, Jung-San Lee, and Bo Li, Vol. 19, No. 1, 2017, pp. 60-71 Article Full Text PDF |
||
8. | High-speed Firewall Rule Verification with O(1) Worst-case Access Time
|
|
Suchart Khummanee, Kitt Tientanopajai, Vol. 19, No. 1, 2017, pp. 72-84 Article Full Text PDF |
||
9. | A Novel Micropayment Scheme with Variable Denomination
|
|
Quan-Yu Zhao, Yi-Ning Liu, Gao Liu, Chin-Chen Chang, Vol. 19, No. 1, 2017, pp. 85-90 Article Full Text PDF |
||
10. | The Paillier's Cryptosystem and Some Variants Revisited
|
|
Zhengjun Cao, Lihua Liu, Vol. 19, No. 1, 2017, pp. 91-98 Article Full Text PDF |
||
11. | An Improvement of Fermat's Factorization by Considering the Last m Digits of Modulus to Decrease Computation Time
|
|
Kritsanapong Somsuk, Kitt Tientanopajai, Vol. 19, No. 1, 2017, pp. 99-111 Article Full Text PDF |
||
12. | Using a New Structure in Group Key Management for Pay-TV
|
|
Shih-Ming Chen, Ching-Rong Yang, and Min-Shiang Hwang, Vol. 19, No. 1, 2017, pp. 112-117 Article Full Text PDF |
||
13. | A Public-Key Approach of Selective Encryption for Images
|
|
Feng Jiang, Paul Salama, Brian King, Vol. 19, No. 1, 2017, pp. 118-126 Article Full Text PDF |
||
14. | An Efficient ID-based Online/Offline Signature Scheme without Key Escrow
|
|
Dan Liu, Shun Zhang, Hong Zhong, Runhua Shi, and Yimin Wang, Vol. 19, No. 1, 2017, pp. 127-137 Article Full Text PDF |
||
15. | Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model
|
|
Bo Meng, Chin-Tser Huang, Yitong Yang, Leyuan Niu, Dejun Wang , Vol. 19, No. 1, 2017, pp. 138-153 Article Full Text PDF |
||
16. | Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization
|
|
Qiang Jin, Zhihong Li, Chin-Chen Chang, Anhong Wang, Li Liu, Vol. 19, No. 1, 2017, pp. 154-162 Article Full Text PDF |
||
17. | Social Bots Detection on Mobile Social Networks
|
|
Cheng Binlin, Fu Jianming, Vol. 19, No. 1, 2017, pp. 163-166 Article Full Text PDF |
||
18. | Subject index to volume 19 (2017)
|
|
Article Full Text PDF | ||
19. | Author index to volume 19 (2017)
|
|
Article Full Text PDF | ||
20. | Reviewer index to volume 19 (2017)
|
|
Article Full Text PDF | ||
21. | All Papers to volume 19 (2017)
|
|
Article Full Text PDF | ||