Quick Search:

Volume: 19, No: 2 (March 1, 2017)

International Journal of Network Security

1. An Investigation on Biometric Internet Security
Omprakash Kaiwartya, Mukesh Prasad, Shiv Prakash, Durgesh Samadhiya, Abdul Hanan Abdullah, andSyed Othmawi Abd Rahman, Vol. 19, No. 2, 2017, pp. 167-176
Article Full Text PDF

2. A Secure and Efficient One-time Password Authentication Scheme for WSN
Chung-Huei Ling, Cheng-Chi Lee, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 19, No. 2, 2017, pp. 177-181
Article Full Text PDF

3. Reliable Alert Fusion of Multiple Intrusion Detection Systems
Vrushank M. Shah, A. K. Agarwal, Vol. 19, No. 2, 2017, pp. 182-192
Article Full Text PDF

4. A Secure Communication Model for Expressive Access Control Using CP-ABE
Jayam Modi, Manav Prajapati, Abhinav Sharma, Ravi Ojha, Devesh Jinwala, Vol. 19, No. 2, 2017, pp. 193-204
Article Full Text PDF

5. Turbo Unequal Error Protection Codes with Multiple Protection Levels
Qian Mao, Chin-Chen Chang, Vol. 19, No. 2, 2017, pp. 205-216
Article Full Text PDF

6. Two-phase Commit with Security Services: Using Distinctive Proofs to Relieve Fragile Communications
Yang Sun, Xueshuai Feng, Hongfeng Zhu, Vol. 19, No. 2, 2017, pp. 217-228
Article Full Text PDF

7. Identity Based Proxy Signature from RSA without Pairings
Lunzhi Deng, Huawei Huang, and Yunyun Qu, Vol. 19, No. 2, 2017, pp. 229-235
Article Full Text PDF

8. Access Control Based Resource Allocation in Cloud Computing Environment
Junshe Wang, Jinliang Liu, and Hongbin Zhang, Vol. 19, No. 2, 2017, pp. 236-243
Article Full Text PDF

9. Attack Intention Recognition: A Review
Abdulghani Ali Ahmed, Noorul Ahlami Kamarul Zaman, Vol. 19, No. 2, 2017, pp. 244-250
Article Full Text PDF

10. Accountability in Cloud Computing by Means of Chain of Trust
Dipen Contractor, Dhiren Patel, Vol. 19, No. 2, 2017, pp. 251-259
Article Full Text PDF

11. A Verifiable E-voting Scheme with Secret Sharing
Lifeng Yuan, Mingchu Li, Cheng Guo, Weitong Hu, and Zhihui Wang, Vol. 19, No. 2, 2017, pp. 260-271
Article Full Text PDF

12. Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe
Hua Ma, Ting Peng, Zhenhua Liu, Vol. 19, No. 2, 2017, pp. 272-284
Article Full Text PDF

13. An Improved DPA Attack on DES with Forth and Back Random Round Algorithm
Cai-Sen Chen, Xi Yu, Yang-Xia Xiang, Xiong Li, and Tengrun Li, Vol. 19, No. 2, 2017, pp. 285-294
Article Full Text PDF

14. SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem
Maged Hamada Ibrahim, Vol. 19, No. 2, 2017, pp. 295-312
Article Full Text PDF

15. Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map
Xingbing Fu, Xunyun Nie, and Fagen Li, Vol. 19, No. 2, 2017, pp. 313-322
Article Full Text PDF

16. A Note on Two Schemes for Secure Outsourcing of Linear Programming
Zhengjun Cao, Lihua Liu, Vol. 19, No. 2, 2017, pp. 323-326
Article Full Text PDF

17. Subject index to volume 19 (2017)
Article Full Text PDF

18. Author index to volume 19 (2017)
Article Full Text PDF

19. Reviewer index to volume 19 (2017)
Article Full Text PDF

20. All Papers to volume 19 (2017)
Article Full Text PDF