Quick Search:

Volume: 19, No: 4 (July 1, 2017)

International Journal of Network Security

1. An Improved Two-party Password-Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps
Hongfeng Zhu, Yifeng Zhang, Vol. 19, No. 4, 2017, pp. 487-497
Article Full Text PDF

2. Pre-image Resistant Cancelable Biometrics Scheme Using Bidirectional Memory Model
Mayada Tarek, Osama Ouda, Taher Hamza, Vol. 19, No. 4, 2017, pp. 498-506
Article Full Text PDF

3. Propagation Model with Varying Population Size of Removable Memory Device Virus
Cong Jin, Xiaoyan Wang, Vol. 19, No. 4, 2017, pp. 507-516
Article Full Text PDF

4. Provably Authenticated Group Key Agreement Based on Braid Groups - The Dynamic Case
Pipat Hiranvanichakorn, Vol. 19, No. 4, 2017, pp. 517-527
Article Full Text PDF

5. An Evolutionary Multi-objective Approach for Modelling Network Security
Seyed Mahmood Hashemi, Jingsha He, Vol. 19, No. 4, 2017, pp. 528-536
Article Full Text PDF

6. A New Trusted Routing Protocol for Vehicular Ad Hoc Networks Using Trusted Metrics
Thangakumar Jeyaprakash, Rajeswari Mukesh, Vol. 19, No. 4, 2017, pp. 537-545
Article Full Text PDF

7. New Constructions of Binary Interleaved Sequences with Low Autocorrelation
Ruifang Meng, Tongjiang Yan, Vol. 19, No. 4, 2017, pp. 546-550
Article Full Text PDF

8. A New Level 3 Trust Hierarchal Certificateless Public Key Cryptography Scheme in the Random Oracle Model
Mohammed Hassouna, Bazara Barry, and Eihab Bashier, Vol. 19, No. 4, 2017, pp. 551-558
Article Full Text PDF

9. A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System
Balamurugan Balusamy, P. Venkata Krishna, G. S. Tamizh Arasi, and Victor Chang, Vol. 19, No. 4, 2017, pp. 559-572
Article Full Text PDF

10. A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability
Yang Chen, Yang Zhao, Hu Xiong, and Feng Yue, Vol. 19, No. 4, 2017, pp. 573-582
Article Full Text PDF

11. COL-MOD: A New Module to Quantify the Weight of Damage Incurred by Collision Attacks
Mina Malekzadeh, Moghis Ashrostaghi, Vol. 19, No. 4, 2017, pp. 583-592
Article Full Text PDF

12. Chaotic Map Based Random Image Steganography Using LSB Technique
Sujarani Rajendran, Manivannan Doraipandian, Vol. 19, No. 4, 2017, pp. 593-598
Article Full Text PDF

13. A Secure Strong Designated Verifier Signature Scheme
Asif Uddin Khan, Bikram Kesari Ratha, Vol. 19, No. 4, 2017, pp. 599-604
Article Full Text PDF

14. On the Security of an Mutual Verifiable Provable Data Auditing in Public Cloud Storage
Jianhong Zhang, Pengyan Li, and Min Xu, Vol. 19, No. 4, 2017, pp. 605-612
Article Full Text PDF

15. Linear Complexity of Quaternary Sequences Over Z4 Derived From Generalized Cyclotomic Classes Modulo 2p
Zhixiong Chen, Vladimir Edemskiy, Vol. 19, No. 4, 2017, pp. 613-622
Article Full Text PDF

16. A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment
Yilei Wang, Dongjie Yan, Fagen Li, Xiong Hu, Vol. 19, No. 4, 2017, pp. 623-630
Article Full Text PDF

17. NFC Communications-based Mutual Authentication Scheme for the Internet of Things
Yanna Ma, Vol. 19, No. 4, 2017, pp. 631-638
Article Full Text PDF

18. An Improved Key-Management Scheme for Hierarchical Access Control
Wan-Yu Chao, Cheng-Yi Tsai, Min-Shiang Hwang, Vol. 19, No. 4, 2017, pp. 639-643
Article Full Text PDF

19. Security on a Knapsack-Type Encryption Scheme Based Upon Hybrid-Model Assumption
Zhengping Jin, Hong Zhang, Zhongxian Li, Vol. 19, No. 4, 2017, pp. 644-647
Article Full Text PDF

20. Comments on a Secure Authentication Scheme for IoT and Cloud Servers
Wei-Liang Tai, Ya-Fen Chang, Vol. 19, No. 4, 2017, pp. 648-651
Article Full Text PDF