| International Journal of Network Security | ||
| 1. | An Improved Two-party Password-Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps
|
|
| Hongfeng Zhu, Yifeng Zhang, Vol. 19, No. 4, 2017, pp. 487-497 Article Full Text PDF |
||
| 2. | Pre-image Resistant Cancelable Biometrics Scheme Using Bidirectional Memory Model
|
|
| Mayada Tarek, Osama Ouda, Taher Hamza, Vol. 19, No. 4, 2017, pp. 498-506 Article Full Text PDF |
||
| 3. | Propagation Model with Varying Population Size of Removable Memory Device Virus
|
|
| Cong Jin, Xiaoyan Wang, Vol. 19, No. 4, 2017, pp. 507-516 Article Full Text PDF |
||
| 4. | Provably Authenticated Group Key Agreement Based on Braid Groups - The Dynamic Case
|
|
| Pipat Hiranvanichakorn, Vol. 19, No. 4, 2017, pp. 517-527 Article Full Text PDF |
||
| 5. | An Evolutionary Multi-objective Approach for Modelling Network Security
|
|
| Seyed Mahmood Hashemi, Jingsha He, Vol. 19, No. 4, 2017, pp. 528-536 Article Full Text PDF |
||
| 6. | A New Trusted Routing Protocol for Vehicular Ad Hoc Networks Using Trusted Metrics
|
|
| Thangakumar Jeyaprakash, Rajeswari Mukesh, Vol. 19, No. 4, 2017, pp. 537-545 Article Full Text PDF |
||
| 7. | New Constructions of Binary Interleaved Sequences with Low Autocorrelation
|
|
| Ruifang Meng, Tongjiang Yan, Vol. 19, No. 4, 2017, pp. 546-550 Article Full Text PDF |
||
| 8. | A New Level 3 Trust Hierarchal Certificateless Public Key Cryptography Scheme in the Random Oracle Model
|
|
| Mohammed Hassouna, Bazara Barry, and Eihab Bashier, Vol. 19, No. 4, 2017, pp. 551-558 Article Full Text PDF |
||
| 9. | A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System
|
|
| Balamurugan Balusamy, P. Venkata Krishna, G. S. Tamizh Arasi, and Victor Chang, Vol. 19, No. 4, 2017, pp. 559-572 Article Full Text PDF |
||
| 10. | A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability
|
|
| Yang Chen, Yang Zhao, Hu Xiong, and Feng Yue, Vol. 19, No. 4, 2017, pp. 573-582 Article Full Text PDF |
||
| 11. | COL-MOD: A New Module to Quantify the Weight of Damage Incurred by Collision Attacks
|
|
| Mina Malekzadeh, Moghis Ashrostaghi, Vol. 19, No. 4, 2017, pp. 583-592 Article Full Text PDF |
||
| 12. | Chaotic Map Based Random Image Steganography Using LSB Technique
|
|
| Sujarani Rajendran, Manivannan Doraipandian, Vol. 19, No. 4, 2017, pp. 593-598 Article Full Text PDF |
||
| 13. | A Secure Strong Designated Verifier Signature Scheme
|
|
| Asif Uddin Khan, Bikram Kesari Ratha, Vol. 19, No. 4, 2017, pp. 599-604 Article Full Text PDF |
||
| 14. | On the Security of an Mutual Verifiable Provable Data Auditing in Public Cloud Storage
|
|
| Jianhong Zhang, Pengyan Li, and Min Xu, Vol. 19, No. 4, 2017, pp. 605-612 Article Full Text PDF |
||
| 15. | Linear Complexity of Quaternary Sequences Over Z4 Derived From Generalized Cyclotomic Classes Modulo 2p
|
|
| Zhixiong Chen, Vladimir Edemskiy, Vol. 19, No. 4, 2017, pp. 613-622 Article Full Text PDF |
||
| 16. | A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment
|
|
| Yilei Wang, Dongjie Yan, Fagen Li, Xiong Hu, Vol. 19, No. 4, 2017, pp. 623-630 Article Full Text PDF |
||
| 17. | NFC Communications-based Mutual Authentication Scheme for the Internet of Things
|
|
| Yanna Ma, Vol. 19, No. 4, 2017, pp. 631-638 Article Full Text PDF |
||
| 18. | An Improved Key-Management Scheme for Hierarchical Access Control
|
|
| Wan-Yu Chao, Cheng-Yi Tsai, Min-Shiang Hwang, Vol. 19, No. 4, 2017, pp. 639-643 Article Full Text PDF |
||
| 19. | Security on a Knapsack-Type Encryption Scheme Based Upon Hybrid-Model Assumption
|
|
| Zhengping Jin, Hong Zhang, Zhongxian Li, Vol. 19, No. 4, 2017, pp. 644-647 Article Full Text PDF |
||
| 20. | Comments on a Secure Authentication Scheme for IoT and Cloud Servers
|
|
| Wei-Liang Tai, Ya-Fen Chang, Vol. 19, No. 4, 2017, pp. 648-651 Article Full Text PDF |
||