International Journal of Network Security | ||
1. | An Investigation on Biometric Internet Security
|
|
Omprakash Kaiwartya, Mukesh Prasad, Shiv Prakash, Durgesh Samadhiya, Abdul Hanan Abdullah, andSyed Othmawi Abd Rahman, Vol. 19, No. 2, 2017, pp. 167-176 Article Full Text PDF |
||
2. | A Secure and Efficient One-time Password Authentication Scheme for WSN
|
|
Chung-Huei Ling, Cheng-Chi Lee, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 19, No. 2, 2017, pp. 177-181 Article Full Text PDF |
||
3. | Reliable Alert Fusion of Multiple Intrusion Detection Systems
|
|
Vrushank M. Shah, A. K. Agarwal, Vol. 19, No. 2, 2017, pp. 182-192 Article Full Text PDF |
||
4. | A Secure Communication Model for Expressive Access Control Using CP-ABE
|
|
Jayam Modi, Manav Prajapati, Abhinav Sharma, Ravi Ojha, Devesh Jinwala, Vol. 19, No. 2, 2017, pp. 193-204 Article Full Text PDF |
||
5. | Turbo Unequal Error Protection Codes with Multiple Protection Levels
|
|
Qian Mao, Chin-Chen Chang, Vol. 19, No. 2, 2017, pp. 205-216 Article Full Text PDF |
||
6. | Two-phase Commit with Security Services: Using Distinctive Proofs to Relieve Fragile Communications
|
|
Yang Sun, Xueshuai Feng, Hongfeng Zhu, Vol. 19, No. 2, 2017, pp. 217-228 Article Full Text PDF |
||
7. | Identity Based Proxy Signature from RSA without Pairings
|
|
Lunzhi Deng, Huawei Huang, and Yunyun Qu, Vol. 19, No. 2, 2017, pp. 229-235 Article Full Text PDF |
||
8. | Access Control Based Resource Allocation in Cloud Computing Environment
|
|
Junshe Wang, Jinliang Liu, and Hongbin Zhang, Vol. 19, No. 2, 2017, pp. 236-243 Article Full Text PDF |
||
9. | Attack Intention Recognition: A Review
|
|
Abdulghani Ali Ahmed, Noorul Ahlami Kamarul Zaman, Vol. 19, No. 2, 2017, pp. 244-250 Article Full Text PDF |
||
10. | Accountability in Cloud Computing by Means of Chain of Trust
|
|
Dipen Contractor, Dhiren Patel, Vol. 19, No. 2, 2017, pp. 251-259 Article Full Text PDF |
||
11. | A Verifiable E-voting Scheme with Secret Sharing
|
|
Lifeng Yuan, Mingchu Li, Cheng Guo, Weitong Hu, and Zhihui Wang, Vol. 19, No. 2, 2017, pp. 260-271 Article Full Text PDF |
||
12. | Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe
|
|
Hua Ma, Ting Peng, Zhenhua Liu, Vol. 19, No. 2, 2017, pp. 272-284 Article Full Text PDF |
||
13. | An Improved DPA Attack on DES with Forth and Back Random Round Algorithm
|
|
Cai-Sen Chen, Xi Yu, Yang-Xia Xiang, Xiong Li, and Tengrun Li, Vol. 19, No. 2, 2017, pp. 285-294 Article Full Text PDF |
||
14. | SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem
|
|
Maged Hamada Ibrahim, Vol. 19, No. 2, 2017, pp. 295-312 Article Full Text PDF |
||
15. | Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map
|
|
Xingbing Fu, Xunyun Nie, and Fagen Li, Vol. 19, No. 2, 2017, pp. 313-322 Article Full Text PDF |
||
16. | A Note on Two Schemes for Secure Outsourcing of Linear Programming
|
|
Zhengjun Cao, Lihua Liu, Vol. 19, No. 2, 2017, pp. 323-326 Article Full Text PDF |
||
17. | Subject index to volume 19 (2017)
|
|
Article Full Text PDF | ||
18. | Author index to volume 19 (2017)
|
|
Article Full Text PDF | ||
19. | Reviewer index to volume 19 (2017)
|
|
Article Full Text PDF | ||
20. | All Papers to volume 19 (2017)
|
|
Article Full Text PDF | ||