International Journal of Network Security | ||
1. | A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding
|
|
Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li, Vol. 19, No. 3, 2017, pp. 327-334 Article Full Text PDF |
||
2. | Behavioral and Security Study of the OHFGC Hash Function
|
|
Ahmed Drissi, Ahmed Asimi, Vol. 19, No. 3, 2017, pp. 335-339 Article Full Text PDF |
||
3. | Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys
|
|
Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li, Vol. 19, No. 3, 2017, pp. 340-346 Article Full Text PDF |
||
4. | A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic
|
|
Cong Jin, Hui Liu, Vol. 19, No. 3, 2017, pp. 347-357 Article Full Text PDF |
||
5. | Weighted Role Based Data Dependency Approach for Intrusion Detection in Database
|
|
Udai Pratap Rao, Nikhil Kumar Singh, Vol. 19, No. 3, 2017, pp. 358-370 Article Full Text PDF |
||
6. | A Novel and Concise Multi-receiver Protocol Based on Chaotic Maps with Privacy Protection
|
|
Yang Sun, Hongfeng Zhu, and Xueshuai Feng, Vol. 19, No. 3, 2017, pp. 371-382 Article Full Text PDF |
||
7. | Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review
|
|
Sunny Behal, Krishan Kumar, Vol. 19, No. 3, 2017, pp. 383-393 Article Full Text PDF |
||
8. | Multi-objective Optimization for Computer Security and Privacy
|
|
Seyed Mahmood Hashemi, Jingsha He and Alireza Ebrahimi Basabi, Vol. 19, No. 3, 2017, pp. 394-405 Article Full Text PDF |
||
9. | A Study of Relationship Among Goldbach Conjecture, Twin Prime and Fibonacci Number
|
|
Chenglian Liu, Vol. 19, No. 3, 2017, pp. 406-412 Article Full Text PDF |
||
10. | Cryptographically imposed model for Efficient Multiple Keyword-based Search over Encrypted Data in Cloud by Secure Index using Bloom Filter and False Random Bit Generator
|
|
Devi Thiyagarajan, R. Ganesan, Vol. 19, No. 3, 2017, pp. 413-420 Article Full Text PDF |
||
11. | A Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks
|
|
K. Arthi, M. Chandramouli Reddy, Vol. 19, No. 3, 2017, pp. 421-429 Article Full Text PDF |
||
12. | Metamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks
|
|
Raghav V. Sampangi, Srinivas Sampalli, Vol. 19, No. 3, 2017, pp. 430-442 Article Full Text PDF |
||
13. | A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms
|
|
Cheng-Yi Tsai, Chi-Yu Liu, Shyh-Chang Tsaur, and Min-Shiang Hwang, Vol. 19, No. 3, 2017, pp. 443-448 Article Full Text PDF |
||
14. | Verifiable Outsourcing Computation of Modular Exponentiations with Single Server
|
|
Jianxing Cai, Yanli Ren,Tiejin Jiang, Vol. 19, No. 3, 2017, pp. 449-457 Article Full Text PDF |
||
15. | Application of Community Detection Algorithm with Link Clustering in Inhibition of Social Network Worms
|
|
Yibing Wang, Jie Fang, and Fuhu Wu, Vol. 19, No. 3, 2017, pp. 458-468 Article Full Text PDF |
||
16. | An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem
|
|
Lidong Han, Qi Xie, and Wenhao Liu, Vol. 19, No. 3, 2017, pp. 469-478 Article Full Text PDF |
||
17. | A Pseudo Random Number Generator Based on Chaotic Billiards
|
|
Khalid Charif, Ahmed Drissi, Zine El Abidine Guennoun, Vol. 19, No. 3, 2017, pp. 479-486 Article Full Text PDF |
||