International Journal of Network Security | ||
1. | The Capacity Analysis in the Secure Cooperative Communication System
|
|
Jong-Shin Chen, Cheng-Ying Yang, Min-Shiang Hwang, Vol. 19, No. 6, 2017, pp. 863-869 Article Full Text PDF |
||
2. | A New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card
|
|
Mourade Azrour, Yousef Farhaoui, Mohammed Ouanan, Vol. 19, No. 6, 2017, pp. 870-879 Article Full Text PDF |
||
3. | The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set
|
|
Rui-Hong Dong, Dong-Fang Wu, Qiu-Yu Zhang, Vol. 19, No. 6, 2017, pp. 880-888 Article Full Text PDF |
||
4. | A New Mutuel Kerberos Authentication Protocol for Distributed Systems
|
|
Zakariae Tbatou, Ahmed Asimi, Younes Asimi, Yassine Sadqi, Azidine Guezzaz, Vol. 19, No. 6, 2017, pp. 889-898 Article Full Text PDF |
||
5. | Further Characterization of H Vectorial Functions
|
|
Yuwei Xu, Chuankun Wu, Vol. 19, No. 6, 2017, pp. 899-903 Article Full Text PDF |
||
6. | A Robust and Efficient Remote Authentication Scheme from Elliptic Curve Cryptosystem
|
|
Guifa Hou, Zhijie Wang, Vol. 19, No. 6, 2017, pp. 904-911 Article Full Text PDF |
||
7. | Secure Data Outsourcing on Cloud Using Secret Sharing Scheme
|
|
Arup Kumar Chattopadhyay, Amitava Nag, Koushik Majumder, Vol. 19, No. 6, 2017, pp. 912-921 Article Full Text PDF |
||
8. | A Novel Weighted Visual Cryptography Scheme with High Visual Quality
|
|
I-Chun Weng, Tzung-Her Chen, Vol. 19, No. 6, 2017, pp. 922-928 Article Full Text PDF |
||
9. | DDoS Attack Detection Using Unique Source IP Deviation
|
|
Ram Charan Baishya, Nozrul Hoque, and Dhruba Kumar Bhattacharyya, Vol. 19, No. 6, 2017, pp. 929-939 Article Full Text PDF |
||
10. | An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet
|
|
Libo He, Chen Yuan, Hu Xiong, and Zhiguang Qin, Vol. 19, No. 6, 2017, pp. 940-949 Article Full Text PDF |
||
11. | Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
|
|
Zhengjun Cao, Lihua Liu, Olivier Markowitch, Vol. 19, No. 6, 2017, pp. 950-954 Article Full Text PDF |
||
12. | Towards an Optimum Authentication Service Allocation and Availability in VANETs
|
|
Safi Ibrahim, Mohamed Hamdy, and Eman Shaaban, Vol. 19, No. 6, 2017, pp. 955-965 Article Full Text PDF |
||
13. | Certificateless Hybrid Signcryption Scheme with Known Session-Specific Temporary Information Security
|
|
Ming Luo, Yuwei Wan, and Donghua Huang, Vol. 19, No. 6, 2017, pp. 966-972 Article Full Text PDF |
||
14. | Revocable ABE with Bounded Ciphertext in Cloud Computing
|
|
Mohamed Ali Hamza, Jianfei Sun, Xuyun Nie, Zhiquan Qin, and Hu Xiong, Vol. 19, No. 6, 2017, pp. 973-983 Article Full Text PDF |
||
15. | Protecting Large Size Medical Images with Logistic Map Using Dynamic Parameters and Key Image
|
|
M. Y. Mohamed Parvees, J. Abdul Samath, and B. Parameswaran Bose, Vol. 19, No. 6, 2017, pp. 984-994 Article Full Text PDF |
||
16. | Confidentiality-Preserving Personal Health Records in Tele-Healthcare System Using Authenticated Certificateless Encryption
|
|
Rui Guo, Huixian Shi, Vol. 19, No. 6, 2017, pp. 995-1004 Article Full Text PDF |
||
17. | Double Verifiable Lossless Secret Sharing Based on Hyper-chaos Generated Random Grid
|
|
Hang Gao, Mengting Hu, Tiegang Gao, and Renhong Cheng, Vol. 19, No. 6, 2017, pp. 1005-1015 Article Full Text PDF |
||
18. | Coverless Text Information Hiding Method Using the Frequent Words Hash
|
|
Jianjun Zhang, Huajun Huang, Lucai Wang, Haijun Lin, Deng Gao, Vol. 19, No. 6, 2017, pp. 1016-1023 Article Full Text PDF |
||
19. | Advanced Random Time Queue Blocking for Effective Protection of Application Servers Against Low-Rate DoS Attacks
|
|
R. Kavitha1, G. Padmavathi, Vol. 19, No. 6, 2017, pp. 1024-1035 Article Full Text PDF |
||
20. | Analysis and Optimization of System Intrusion Tolerance Capacity Based on Markov
|
|
Zhiyong Luo, Bo You, Peng Wang, Jie Su, and Yi Liang, Vol. 19, No. 6, 2017, pp. 1036-1043 Article Full Text PDF |
||
21. | Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare
|
|
Yang Zhao, Pengcheng Fan, Haoting Cai, Zhiguang Qin and Hu Xiong, Vol. 19, No. 6, 2017, pp. 1044-1052 Article Full Text PDF |
||
22. | Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme
|
|
Jongho Moon, Donghoon Lee, Jaewook Jung, and Dongho Won, Vol. 19, No. 6, 2017, pp. 1053-1061 Article Full Text PDF |
||
23. | Clustering Based K-anonymity Algorithm for Privacy Preservation
|
|
Sang Ni, Mengbo Xie, Quan Qian, Vol. 19, No. 6, 2017, pp. 1062-1071 Article Full Text PDF |
||
24. | An Efficient Code Based Digital Signature Algorithm
|
|
Fang Ren, Dong Zheng, WeiJing Wang, Vol. 19, No. 6, 2017, pp. 1072-1079 Article Full Text PDF |
||
25. | Reviewer index to volume 19 (2017)
|
|
Article Full Text PDF | ||