International Journal of Network Security | ||
1. | An Improved Two-party Password-Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps
|
|
Hongfeng Zhu, Yifeng Zhang, Vol. 19, No. 4, 2017, pp. 487-497 Article Full Text PDF |
||
2. | Pre-image Resistant Cancelable Biometrics Scheme Using Bidirectional Memory Model
|
|
Mayada Tarek, Osama Ouda, Taher Hamza, Vol. 19, No. 4, 2017, pp. 498-506 Article Full Text PDF |
||
3. | Propagation Model with Varying Population Size of Removable Memory Device Virus
|
|
Cong Jin, Xiaoyan Wang, Vol. 19, No. 4, 2017, pp. 507-516 Article Full Text PDF |
||
4. | Provably Authenticated Group Key Agreement Based on Braid Groups - The Dynamic Case
|
|
Pipat Hiranvanichakorn, Vol. 19, No. 4, 2017, pp. 517-527 Article Full Text PDF |
||
5. | An Evolutionary Multi-objective Approach for Modelling Network Security
|
|
Seyed Mahmood Hashemi, Jingsha He, Vol. 19, No. 4, 2017, pp. 528-536 Article Full Text PDF |
||
6. | A New Trusted Routing Protocol for Vehicular Ad Hoc Networks Using Trusted Metrics
|
|
Thangakumar Jeyaprakash, Rajeswari Mukesh, Vol. 19, No. 4, 2017, pp. 537-545 Article Full Text PDF |
||
7. | New Constructions of Binary Interleaved Sequences with Low Autocorrelation
|
|
Ruifang Meng, Tongjiang Yan, Vol. 19, No. 4, 2017, pp. 546-550 Article Full Text PDF |
||
8. | A New Level 3 Trust Hierarchal Certificateless Public Key Cryptography Scheme in the Random Oracle Model
|
|
Mohammed Hassouna, Bazara Barry, and Eihab Bashier, Vol. 19, No. 4, 2017, pp. 551-558 Article Full Text PDF |
||
9. | A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System
|
|
Balamurugan Balusamy, P. Venkata Krishna, G. S. Tamizh Arasi, and Victor Chang, Vol. 19, No. 4, 2017, pp. 559-572 Article Full Text PDF |
||
10. | A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability
|
|
Yang Chen, Yang Zhao, Hu Xiong, and Feng Yue, Vol. 19, No. 4, 2017, pp. 573-582 Article Full Text PDF |
||
11. | COL-MOD: A New Module to Quantify the Weight of Damage Incurred by Collision Attacks
|
|
Mina Malekzadeh, Moghis Ashrostaghi, Vol. 19, No. 4, 2017, pp. 583-592 Article Full Text PDF |
||
12. | Chaotic Map Based Random Image Steganography Using LSB Technique
|
|
Sujarani Rajendran, Manivannan Doraipandian, Vol. 19, No. 4, 2017, pp. 593-598 Article Full Text PDF |
||
13. | A Secure Strong Designated Verifier Signature Scheme
|
|
Asif Uddin Khan, Bikram Kesari Ratha, Vol. 19, No. 4, 2017, pp. 599-604 Article Full Text PDF |
||
14. | On the Security of an Mutual Verifiable Provable Data Auditing in Public Cloud Storage
|
|
Jianhong Zhang, Pengyan Li, and Min Xu, Vol. 19, No. 4, 2017, pp. 605-612 Article Full Text PDF |
||
15. | Linear Complexity of Quaternary Sequences Over Z4 Derived From Generalized Cyclotomic Classes Modulo 2p
|
|
Zhixiong Chen, Vladimir Edemskiy, Vol. 19, No. 4, 2017, pp. 613-622 Article Full Text PDF |
||
16. | A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment
|
|
Yilei Wang, Dongjie Yan, Fagen Li, Xiong Hu, Vol. 19, No. 4, 2017, pp. 623-630 Article Full Text PDF |
||
17. | NFC Communications-based Mutual Authentication Scheme for the Internet of Things
|
|
Yanna Ma, Vol. 19, No. 4, 2017, pp. 631-638 Article Full Text PDF |
||
18. | An Improved Key-Management Scheme for Hierarchical Access Control
|
|
Wan-Yu Chao, Cheng-Yi Tsai, Min-Shiang Hwang, Vol. 19, No. 4, 2017, pp. 639-643 Article Full Text PDF |
||
19. | Security on a Knapsack-Type Encryption Scheme Based Upon Hybrid-Model Assumption
|
|
Zhengping Jin, Hong Zhang, Zhongxian Li, Vol. 19, No. 4, 2017, pp. 644-647 Article Full Text PDF |
||
20. | Comments on a Secure Authentication Scheme for IoT and Cloud Servers
|
|
Wei-Liang Tai, Ya-Fen Chang, Vol. 19, No. 4, 2017, pp. 648-651 Article Full Text PDF |
||