| International Journal of Network Security | ||
| 1. | A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding
|
|
| Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li, Vol. 19, No. 3, 2017, pp. 327-334 Article Full Text PDF |
||
| 2. | Behavioral and Security Study of the OHFGC Hash Function
|
|
| Ahmed Drissi, Ahmed Asimi, Vol. 19, No. 3, 2017, pp. 335-339 Article Full Text PDF |
||
| 3. | Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys
|
|
| Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li, Vol. 19, No. 3, 2017, pp. 340-346 Article Full Text PDF |
||
| 4. | A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic
|
|
| Cong Jin, Hui Liu, Vol. 19, No. 3, 2017, pp. 347-357 Article Full Text PDF |
||
| 5. | Weighted Role Based Data Dependency Approach for Intrusion Detection in Database
|
|
| Udai Pratap Rao, Nikhil Kumar Singh, Vol. 19, No. 3, 2017, pp. 358-370 Article Full Text PDF |
||
| 6. | A Novel and Concise Multi-receiver Protocol Based on Chaotic Maps with Privacy Protection
|
|
| Yang Sun, Hongfeng Zhu, and Xueshuai Feng, Vol. 19, No. 3, 2017, pp. 371-382 Article Full Text PDF |
||
| 7. | Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review
|
|
| Sunny Behal, Krishan Kumar, Vol. 19, No. 3, 2017, pp. 383-393 Article Full Text PDF |
||
| 8. | Multi-objective Optimization for Computer Security and Privacy
|
|
| Seyed Mahmood Hashemi, Jingsha He and Alireza Ebrahimi Basabi, Vol. 19, No. 3, 2017, pp. 394-405 Article Full Text PDF |
||
| 9. | A Study of Relationship Among Goldbach Conjecture, Twin Prime and Fibonacci Number
|
|
| Chenglian Liu, Vol. 19, No. 3, 2017, pp. 406-412 Article Full Text PDF |
||
| 10. | Cryptographically imposed model for Efficient Multiple Keyword-based Search over Encrypted Data in Cloud by Secure Index using Bloom Filter and False Random Bit Generator
|
|
| Devi Thiyagarajan, R. Ganesan, Vol. 19, No. 3, 2017, pp. 413-420 Article Full Text PDF |
||
| 11. | A Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks
|
|
| K. Arthi, M. Chandramouli Reddy, Vol. 19, No. 3, 2017, pp. 421-429 Article Full Text PDF |
||
| 12. | Metamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks
|
|
| Raghav V. Sampangi, Srinivas Sampalli, Vol. 19, No. 3, 2017, pp. 430-442 Article Full Text PDF |
||
| 13. | A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms
|
|
| Cheng-Yi Tsai, Chi-Yu Liu, Shyh-Chang Tsaur, and Min-Shiang Hwang, Vol. 19, No. 3, 2017, pp. 443-448 Article Full Text PDF |
||
| 14. | Verifiable Outsourcing Computation of Modular Exponentiations with Single Server
|
|
| Jianxing Cai, Yanli Ren,Tiejin Jiang, Vol. 19, No. 3, 2017, pp. 449-457 Article Full Text PDF |
||
| 15. | Application of Community Detection Algorithm with Link Clustering in Inhibition of Social Network Worms
|
|
| Yibing Wang, Jie Fang, and Fuhu Wu, Vol. 19, No. 3, 2017, pp. 458-468 Article Full Text PDF |
||
| 16. | An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem
|
|
| Lidong Han, Qi Xie, and Wenhao Liu, Vol. 19, No. 3, 2017, pp. 469-478 Article Full Text PDF |
||
| 17. | A Pseudo Random Number Generator Based on Chaotic Billiards
|
|
| Khalid Charif, Ahmed Drissi, Zine El Abidine Guennoun, Vol. 19, No. 3, 2017, pp. 479-486 Article Full Text PDF |
||