Quick Search:

Volume: 19, No: 3 (May 1, 2017)

International Journal of Network Security

1. A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding
Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li, Vol. 19, No. 3, 2017, pp. 327-334
Article Full Text PDF

2. Behavioral and Security Study of the OHFGC Hash Function
Ahmed Drissi, Ahmed Asimi, Vol. 19, No. 3, 2017, pp. 335-339
Article Full Text PDF

3. Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys
Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li, Vol. 19, No. 3, 2017, pp. 340-346
Article Full Text PDF

4. A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic
Cong Jin, Hui Liu, Vol. 19, No. 3, 2017, pp. 347-357
Article Full Text PDF

5. Weighted Role Based Data Dependency Approach for Intrusion Detection in Database
Udai Pratap Rao, Nikhil Kumar Singh, Vol. 19, No. 3, 2017, pp. 358-370
Article Full Text PDF

6. A Novel and Concise Multi-receiver Protocol Based on Chaotic Maps with Privacy Protection
Yang Sun, Hongfeng Zhu, and Xueshuai Feng, Vol. 19, No. 3, 2017, pp. 371-382
Article Full Text PDF

7. Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review
Sunny Behal, Krishan Kumar, Vol. 19, No. 3, 2017, pp. 383-393
Article Full Text PDF

8. Multi-objective Optimization for Computer Security and Privacy
Seyed Mahmood Hashemi, Jingsha He and Alireza Ebrahimi Basabi, Vol. 19, No. 3, 2017, pp. 394-405
Article Full Text PDF

9. A Study of Relationship Among Goldbach Conjecture, Twin Prime and Fibonacci Number
Chenglian Liu, Vol. 19, No. 3, 2017, pp. 406-412
Article Full Text PDF

10. Cryptographically imposed model for Efficient Multiple Keyword-based Search over Encrypted Data in Cloud by Secure Index using Bloom Filter and False Random Bit Generator
Devi Thiyagarajan, R. Ganesan, Vol. 19, No. 3, 2017, pp. 413-420
Article Full Text PDF

11. A Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks
K. Arthi, M. Chandramouli Reddy, Vol. 19, No. 3, 2017, pp. 421-429
Article Full Text PDF

12. Metamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks
Raghav V. Sampangi, Srinivas Sampalli, Vol. 19, No. 3, 2017, pp. 430-442
Article Full Text PDF

13. A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms
Cheng-Yi Tsai, Chi-Yu Liu, Shyh-Chang Tsaur, and Min-Shiang Hwang, Vol. 19, No. 3, 2017, pp. 443-448
Article Full Text PDF

14. Verifiable Outsourcing Computation of Modular Exponentiations with Single Server
Jianxing Cai, Yanli Ren,Tiejin Jiang, Vol. 19, No. 3, 2017, pp. 449-457
Article Full Text PDF

15. Application of Community Detection Algorithm with Link Clustering in Inhibition of Social Network Worms
Yibing Wang, Jie Fang, and Fuhu Wu, Vol. 19, No. 3, 2017, pp. 458-468
Article Full Text PDF

16. An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem
Lidong Han, Qi Xie, and Wenhao Liu, Vol. 19, No. 3, 2017, pp. 469-478
Article Full Text PDF

17. A Pseudo Random Number Generator Based on Chaotic Billiards
Khalid Charif, Ahmed Drissi, Zine El Abidine Guennoun, Vol. 19, No. 3, 2017, pp. 479-486
Article Full Text PDF