| International Journal of Network Security | ||
| 1. | A Survey of Blockchain Security Issues and Challenges
|
|
| Iuon-Chang Lin and Tzu-Chun Liao, Vol. 19, No. 5, 2017, pp. 653-659 Article Full Text PDF |
||
| 2. | Efficient Feature Selection Technique for Network Intrusion Detection System Using Discrete Differential Evolution and Decision
|
|
| Ebenezer Popoola, Aderemi Oluyinka Adewumi, Vol. 19, No. 5, 2017, pp. 660-669 Article Full Text PDF |
||
| 3. | GPS Spoofing Detection Based on Decision Fusion with a K-out-of-N Rule
|
|
| Minhong Sun, Yuan Qin, Jianrong Bao, Xutao Yu, Vol. 19, No. 5, 2017, pp. 670-674 Article Full Text PDF |
||
| 4. | Design and Implementation of an Intrusion Prevention System Inspired Immune Systems
|
|
| Yousef Farhaoui, Vol. 19, No. 5, 2017, pp. 675-683 Article Full Text PDF |
||
| 5. | Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage
|
|
| K. Brindha and N. Jeyanthi, Vol. 19, No. 5, 2017, pp. 684-693 Article Full Text PDF |
||
| 6. | Design and Implementation of Secure Remote e-Voting System Using Homomorphic Encryption
|
|
| Ihsan Jabbar and Saad Najim Alsaad, Vol. 19, No. 5, 2017, pp. 694-703 Article Full Text PDF |
||
| 7. | A Key-Policy Attribute-based Encryption Scheme for General Circuit from Bilinear Maps
|
|
| Peng Hu, Haiying Gao, Vol. 19, No. 5, 2017, pp. 704-710 Article Full Text PDF |
||
| 8. | An Anti-Phishing Password Authentication Protocol
|
|
| Pramote Kuacharoen, Vol. 19, No. 5, 2017, pp. 711-719 Article Full Text PDF |
||
| 9. | Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage
|
|
| Ye Tian, Yanbin Peng, Gaimei Gao, Xinguang Peng, Vol. 19, No. 5, 2017, pp. 720-726 Article Full Text PDF |
||
| 10. | A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection
|
|
| Mohd Zaki Mas'ud, Shahrin Sahib, Mohd Faizal Abdollah, Siti Rahayu Selamat, Choo Yun Huoy, Vol. 19, No. 5, 2017, pp. 727-733 Article Full Text PDF |
||
| 11. | Discriminating Flash Events from DDoS Attacks: A Comprehensive Review
|
|
| Sunny Behal, Krishan Kumar, Monika Sachdeva, Vol. 19, No. 5, 2017, pp. 734-741 Article Full Text PDF |
||
| 12. | Information Security Risk Management Framework for University Computing Environment
|
|
| Umesh Kumar Singh, Chanchala Joshi, Vol. 19, No. 5, 2017, pp. 742-751 Article Full Text PDF |
||
| 13. | Speech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction and Energy to Entropy Ratio
|
|
| Qiu-Yu Zhang, Wen-Jin Hu, Si-Bin Qiao, and Yi-Bo Huang, Vol. 19, No. 5, 2017, pp. 752-760 Article Full Text PDF |
||
| 14. | An Unsupervised Method for Detection of XSS Attack
|
|
| Swaswati Goswami, Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal Kalita, Vol. 19, No. 5, 2017, pp. 761-775 Article Full Text PDF |
||
| 15. | Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol
|
|
| Osman Wahballa, Abubaker Wahaballa, Fagen Li, Idris Ibn Idris and Chunxiang Xu, Vol. 19, No. 5, 2017, pp. 776-784 Article Full Text PDF |
||
| 16. | An Enhanced Anonymous Password-based Authenticated Key Agreement Scheme with Formal Proof
|
|
| Min Wu, Jianhua Chen, Ruibing Wang, Vol. 19, No. 5, 2017, pp. 785-793 Article Full Text PDF |
||
| 17. | A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems
|
|
| Caimei Wang, Yan Xiong, Wenjuan Cheng, Wenchao Huang, Huihua Xia, Jianmeng Huang, Vol. 19, No. 5, 2017, pp. 794-803 Article Full Text PDF |
||
| 18. | A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption
|
|
| Caihui Lan, Haifeng Li, Shoulin Yin, and Lin Teng, Vol. 19, No. 5, 2017, pp. 804-810 Article Full Text PDF |
||
| 19. | Policy-based Signatures for Predicates
|
|
| Fei Tang, Yousheng Zhou, Vol. 19, No. 5, 2017, pp. 811-822 Article Full Text PDF |
||
| 20. | A New Way to Prevent UKS Attacks Using Hardware Security Chips
|
|
| Qianying Zhang, Zhiping Shi, Vol. 19, No. 5, 2017, pp. 823-831 Article Full Text PDF |
||
| 21. | Whirlwind: A New Method to Attack Routing Protocol in Mobile Ad Hoc Network
|
|
| Luong Thai Ngoc and Vo Thanh Tu, Vol. 19, No. 5, 2017, pp. 832-838 Article Full Text PDF |
||
| 22. | Distinguishing Medical Web Pages from Pornographic Ones: An Efficient Pornography Websites Filtering Method
|
|
| Jyh-Jian Sheu, Vol. 19, No. 5, 2017, pp. 839-850 Article Full Text PDF |
||
| 23. | Privacy-preserving Similarity Sorting in Multi-party Model
|
|
| Yifei Yao, Fanhua Yu, Vol. 19, No. 5, 2017, pp. 851-857 Article Full Text PDF |
||
| 24. | An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching
|
|
| Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang, Vol. 19, No. 5, 2017, pp. 858-862 Article Full Text PDF |
||