International Journal of Network Security | ||
1. | A Survey of Blockchain Security Issues and Challenges
|
|
Iuon-Chang Lin and Tzu-Chun Liao, Vol. 19, No. 5, 2017, pp. 653-659 Article Full Text PDF |
||
2. | Efficient Feature Selection Technique for Network Intrusion Detection System Using Discrete Differential Evolution and Decision
|
|
Ebenezer Popoola, Aderemi Oluyinka Adewumi, Vol. 19, No. 5, 2017, pp. 660-669 Article Full Text PDF |
||
3. | GPS Spoofing Detection Based on Decision Fusion with a K-out-of-N Rule
|
|
Minhong Sun, Yuan Qin, Jianrong Bao, Xutao Yu, Vol. 19, No. 5, 2017, pp. 670-674 Article Full Text PDF |
||
4. | Design and Implementation of an Intrusion Prevention System Inspired Immune Systems
|
|
Yousef Farhaoui, Vol. 19, No. 5, 2017, pp. 675-683 Article Full Text PDF |
||
5. | Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage
|
|
K. Brindha and N. Jeyanthi, Vol. 19, No. 5, 2017, pp. 684-693 Article Full Text PDF |
||
6. | Design and Implementation of Secure Remote e-Voting System Using Homomorphic Encryption
|
|
Ihsan Jabbar and Saad Najim Alsaad, Vol. 19, No. 5, 2017, pp. 694-703 Article Full Text PDF |
||
7. | A Key-Policy Attribute-based Encryption Scheme for General Circuit from Bilinear Maps
|
|
Peng Hu, Haiying Gao, Vol. 19, No. 5, 2017, pp. 704-710 Article Full Text PDF |
||
8. | An Anti-Phishing Password Authentication Protocol
|
|
Pramote Kuacharoen, Vol. 19, No. 5, 2017, pp. 711-719 Article Full Text PDF |
||
9. | Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage
|
|
Ye Tian, Yanbin Peng, Gaimei Gao, Xinguang Peng, Vol. 19, No. 5, 2017, pp. 720-726 Article Full Text PDF |
||
10. | A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection
|
|
Mohd Zaki Mas'ud, Shahrin Sahib, Mohd Faizal Abdollah, Siti Rahayu Selamat, Choo Yun Huoy, Vol. 19, No. 5, 2017, pp. 727-733 Article Full Text PDF |
||
11. | Discriminating Flash Events from DDoS Attacks: A Comprehensive Review
|
|
Sunny Behal, Krishan Kumar, Monika Sachdeva, Vol. 19, No. 5, 2017, pp. 734-741 Article Full Text PDF |
||
12. | Information Security Risk Management Framework for University Computing Environment
|
|
Umesh Kumar Singh, Chanchala Joshi, Vol. 19, No. 5, 2017, pp. 742-751 Article Full Text PDF |
||
13. | Speech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction and Energy to Entropy Ratio
|
|
Qiu-Yu Zhang, Wen-Jin Hu, Si-Bin Qiao, and Yi-Bo Huang, Vol. 19, No. 5, 2017, pp. 752-760 Article Full Text PDF |
||
14. | An Unsupervised Method for Detection of XSS Attack
|
|
Swaswati Goswami, Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal Kalita, Vol. 19, No. 5, 2017, pp. 761-775 Article Full Text PDF |
||
15. | Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol
|
|
Osman Wahballa, Abubaker Wahaballa, Fagen Li, Idris Ibn Idris and Chunxiang Xu, Vol. 19, No. 5, 2017, pp. 776-784 Article Full Text PDF |
||
16. | An Enhanced Anonymous Password-based Authenticated Key Agreement Scheme with Formal Proof
|
|
Min Wu, Jianhua Chen, Ruibing Wang, Vol. 19, No. 5, 2017, pp. 785-793 Article Full Text PDF |
||
17. | A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems
|
|
Caimei Wang, Yan Xiong, Wenjuan Cheng, Wenchao Huang, Huihua Xia, Jianmeng Huang, Vol. 19, No. 5, 2017, pp. 794-803 Article Full Text PDF |
||
18. | A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption
|
|
Caihui Lan, Haifeng Li, Shoulin Yin, and Lin Teng, Vol. 19, No. 5, 2017, pp. 804-810 Article Full Text PDF |
||
19. | Policy-based Signatures for Predicates
|
|
Fei Tang, Yousheng Zhou, Vol. 19, No. 5, 2017, pp. 811-822 Article Full Text PDF |
||
20. | A New Way to Prevent UKS Attacks Using Hardware Security Chips
|
|
Qianying Zhang, Zhiping Shi, Vol. 19, No. 5, 2017, pp. 823-831 Article Full Text PDF |
||
21. | Whirlwind: A New Method to Attack Routing Protocol in Mobile Ad Hoc Network
|
|
Luong Thai Ngoc and Vo Thanh Tu, Vol. 19, No. 5, 2017, pp. 832-838 Article Full Text PDF |
||
22. | Distinguishing Medical Web Pages from Pornographic Ones: An Efficient Pornography Websites Filtering Method
|
|
Jyh-Jian Sheu, Vol. 19, No. 5, 2017, pp. 839-850 Article Full Text PDF |
||
23. | Privacy-preserving Similarity Sorting in Multi-party Model
|
|
Yifei Yao, Fanhua Yu, Vol. 19, No. 5, 2017, pp. 851-857 Article Full Text PDF |
||
24. | An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching
|
|
Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang, Vol. 19, No. 5, 2017, pp. 858-862 Article Full Text PDF |
||