| International Journal of Network Security | ||
| 1. | An Efficient and Secure Smart Card Based Password Authentication Scheme
|
|
| Yanjun Liu, Chin-Chen Chang and Shih-Chang Chang, Vol. 19, No. 1, 2017, pp. 1-10 Article Full Text PDF |
||
| 2. | A Homomorphic Universal Re-encryptor for Identity-based Encryption
|
|
| Liang Liu, Jun Ye, Vol. 19, No. 1, 2017, pp. 11-19 Article Full Text PDF |
||
| 3. | An SVEIR Defending Model with Partial Immunization for Worms
|
|
| Fangwei Wang, Hongfeng Gao, Yong Yang, Changguang Wang, Vol. 19, No. 1, 2017, pp. 20-26 Article Full Text PDF |
||
| 4. | Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme
|
|
| Hisham Abdalla, Xiong Hu, Abubaker Wahaballa, Ahmed Abdalla, Mohammed Ramadan and Qin Zhiguang, Vol. 19, No. 1, 2017, pp. 27-38 Article Full Text PDF |
||
| 5. | An Improved Privacy Protection Security Protocol Based on NFC
|
|
| Jie Ling, Ying Wang, Weifeng Chen, Vol. 19, No. 1, 2017, pp. 39-46 Article Full Text PDF |
||
| 6. | Mojette (d) Secret Image “SEDIH” in an Encrypted Double Image – A Histo Approach
|
|
| Padmapriya Praveenkumar, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan, Vol. 19, No. 1, 2017, pp. 47-59 Article Full Text PDF |
||
| 7. | SMP: Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks
|
|
| Kuo-Jui Wei, Jung-San Lee, and Bo Li, Vol. 19, No. 1, 2017, pp. 60-71 Article Full Text PDF |
||
| 8. | High-speed Firewall Rule Verification with O(1) Worst-case Access Time
|
|
| Suchart Khummanee, Kitt Tientanopajai, Vol. 19, No. 1, 2017, pp. 72-84 Article Full Text PDF |
||
| 9. | A Novel Micropayment Scheme with Variable Denomination
|
|
| Quan-Yu Zhao, Yi-Ning Liu, Gao Liu, Chin-Chen Chang, Vol. 19, No. 1, 2017, pp. 85-90 Article Full Text PDF |
||
| 10. | The Paillier's Cryptosystem and Some Variants Revisited
|
|
| Zhengjun Cao, Lihua Liu, Vol. 19, No. 1, 2017, pp. 91-98 Article Full Text PDF |
||
| 11. | An Improvement of Fermat's Factorization by Considering the Last m Digits of Modulus to Decrease Computation Time
|
|
| Kritsanapong Somsuk, Kitt Tientanopajai, Vol. 19, No. 1, 2017, pp. 99-111 Article Full Text PDF |
||
| 12. | Using a New Structure in Group Key Management for Pay-TV
|
|
| Shih-Ming Chen, Ching-Rong Yang, and Min-Shiang Hwang, Vol. 19, No. 1, 2017, pp. 112-117 Article Full Text PDF |
||
| 13. | A Public-Key Approach of Selective Encryption for Images
|
|
| Feng Jiang, Paul Salama, Brian King, Vol. 19, No. 1, 2017, pp. 118-126 Article Full Text PDF |
||
| 14. | An Efficient ID-based Online/Offline Signature Scheme without Key Escrow
|
|
| Dan Liu, Shun Zhang, Hong Zhong, Runhua Shi, and Yimin Wang, Vol. 19, No. 1, 2017, pp. 127-137 Article Full Text PDF |
||
| 15. | Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model
|
|
| Bo Meng, Chin-Tser Huang, Yitong Yang, Leyuan Niu, Dejun Wang , Vol. 19, No. 1, 2017, pp. 138-153 Article Full Text PDF |
||
| 16. | Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization
|
|
| Qiang Jin, Zhihong Li, Chin-Chen Chang, Anhong Wang, Li Liu, Vol. 19, No. 1, 2017, pp. 154-162 Article Full Text PDF |
||
| 17. | Social Bots Detection on Mobile Social Networks
|
|
| Cheng Binlin, Fu Jianming, Vol. 19, No. 1, 2017, pp. 163-166 Article Full Text PDF |
||
| 18. | Subject index to volume 19 (2017)
|
|
| Article Full Text PDF | ||
| 19. | Author index to volume 19 (2017)
|
|
| Article Full Text PDF | ||
| 20. | Reviewer index to volume 19 (2017)
|
|
| Article Full Text PDF | ||
| 21. | All Papers to volume 19 (2017)
|
|
| Article Full Text PDF | ||