Quick Search:

Volume: 19, No: 5 (September 1, 2017)

International Journal of Network Security

1. A Survey of Blockchain Security Issues and Challenges
Iuon-Chang Lin and Tzu-Chun Liao, Vol. 19, No. 5, 2017, pp. 653-659
Article Full Text PDF

2. Efficient Feature Selection Technique for Network Intrusion Detection System Using Discrete Differential Evolution and Decision
Ebenezer Popoola, Aderemi Oluyinka Adewumi, Vol. 19, No. 5, 2017, pp. 660-669
Article Full Text PDF

3. GPS Spoofing Detection Based on Decision Fusion with a K-out-of-N Rule
Minhong Sun, Yuan Qin, Jianrong Bao, Xutao Yu, Vol. 19, No. 5, 2017, pp. 670-674
Article Full Text PDF

4. Design and Implementation of an Intrusion Prevention System Inspired Immune Systems
Yousef Farhaoui, Vol. 19, No. 5, 2017, pp. 675-683
Article Full Text PDF

5. Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage
K. Brindha and N. Jeyanthi, Vol. 19, No. 5, 2017, pp. 684-693
Article Full Text PDF

6. Design and Implementation of Secure Remote e-Voting System Using Homomorphic Encryption
Ihsan Jabbar and Saad Najim Alsaad, Vol. 19, No. 5, 2017, pp. 694-703
Article Full Text PDF

7. A Key-Policy Attribute-based Encryption Scheme for General Circuit from Bilinear Maps
Peng Hu, Haiying Gao, Vol. 19, No. 5, 2017, pp. 704-710
Article Full Text PDF

8. An Anti-Phishing Password Authentication Protocol
Pramote Kuacharoen, Vol. 19, No. 5, 2017, pp. 711-719
Article Full Text PDF

9. Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage
Ye Tian, Yanbin Peng, Gaimei Gao, Xinguang Peng, Vol. 19, No. 5, 2017, pp. 720-726
Article Full Text PDF

10. A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection
Mohd Zaki Mas'ud, Shahrin Sahib, Mohd Faizal Abdollah, Siti Rahayu Selamat, Choo Yun Huoy, Vol. 19, No. 5, 2017, pp. 727-733
Article Full Text PDF

11. Discriminating Flash Events from DDoS Attacks: A Comprehensive Review
Sunny Behal, Krishan Kumar, Monika Sachdeva, Vol. 19, No. 5, 2017, pp. 734-741
Article Full Text PDF

12. Information Security Risk Management Framework for University Computing Environment
Umesh Kumar Singh, Chanchala Joshi, Vol. 19, No. 5, 2017, pp. 742-751
Article Full Text PDF

13. Speech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction and Energy to Entropy Ratio
Qiu-Yu Zhang, Wen-Jin Hu, Si-Bin Qiao, and Yi-Bo Huang, Vol. 19, No. 5, 2017, pp. 752-760
Article Full Text PDF

14. An Unsupervised Method for Detection of XSS Attack
Swaswati Goswami, Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal Kalita, Vol. 19, No. 5, 2017, pp. 761-775
Article Full Text PDF

15. Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol
Osman Wahballa, Abubaker Wahaballa, Fagen Li, Idris Ibn Idris and Chunxiang Xu, Vol. 19, No. 5, 2017, pp. 776-784
Article Full Text PDF

16. An Enhanced Anonymous Password-based Authenticated Key Agreement Scheme with Formal Proof
Min Wu, Jianhua Chen, Ruibing Wang, Vol. 19, No. 5, 2017, pp. 785-793
Article Full Text PDF

17. A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems
Caimei Wang, Yan Xiong, Wenjuan Cheng, Wenchao Huang, Huihua Xia, Jianmeng Huang, Vol. 19, No. 5, 2017, pp. 794-803
Article Full Text PDF

18. A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption
Caihui Lan, Haifeng Li, Shoulin Yin, and Lin Teng, Vol. 19, No. 5, 2017, pp. 804-810
Article Full Text PDF

19. Policy-based Signatures for Predicates
Fei Tang, Yousheng Zhou, Vol. 19, No. 5, 2017, pp. 811-822
Article Full Text PDF

20. A New Way to Prevent UKS Attacks Using Hardware Security Chips
Qianying Zhang, Zhiping Shi, Vol. 19, No. 5, 2017, pp. 823-831
Article Full Text PDF

21. Whirlwind: A New Method to Attack Routing Protocol in Mobile Ad Hoc Network
Luong Thai Ngoc and Vo Thanh Tu, Vol. 19, No. 5, 2017, pp. 832-838
Article Full Text PDF

22. Distinguishing Medical Web Pages from Pornographic Ones: An Efficient Pornography Websites Filtering Method
Jyh-Jian Sheu, Vol. 19, No. 5, 2017, pp. 839-850
Article Full Text PDF

23. Privacy-preserving Similarity Sorting in Multi-party Model
Yifei Yao, Fanhua Yu, Vol. 19, No. 5, 2017, pp. 851-857
Article Full Text PDF

24. An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching
Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang, Vol. 19, No. 5, 2017, pp. 858-862
Article Full Text PDF