Quick Search:

Volume: 19, No: 6 (November 1, 2017)

International Journal of Network Security

1. The Capacity Analysis in the Secure Cooperative Communication System
Jong-Shin Chen, Cheng-Ying Yang, Min-Shiang Hwang, Vol. 19, No. 6, 2017, pp. 863-869
Article Full Text PDF

2. A New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card
Mourade Azrour, Yousef Farhaoui, Mohammed Ouanan, Vol. 19, No. 6, 2017, pp. 870-879
Article Full Text PDF

3. The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set
Rui-Hong Dong, Dong-Fang Wu, Qiu-Yu Zhang, Vol. 19, No. 6, 2017, pp. 880-888
Article Full Text PDF

4. A New Mutuel Kerberos Authentication Protocol for Distributed Systems
Zakariae Tbatou, Ahmed Asimi, Younes Asimi, Yassine Sadqi, Azidine Guezzaz, Vol. 19, No. 6, 2017, pp. 889-898
Article Full Text PDF

5. Further Characterization of H Vectorial Functions
Yuwei Xu, Chuankun Wu, Vol. 19, No. 6, 2017, pp. 899-903
Article Full Text PDF

6. A Robust and Efficient Remote Authentication Scheme from Elliptic Curve Cryptosystem
Guifa Hou, Zhijie Wang, Vol. 19, No. 6, 2017, pp. 904-911
Article Full Text PDF

7. Secure Data Outsourcing on Cloud Using Secret Sharing Scheme
Arup Kumar Chattopadhyay, Amitava Nag, Koushik Majumder, Vol. 19, No. 6, 2017, pp. 912-921
Article Full Text PDF

8. A Novel Weighted Visual Cryptography Scheme with High Visual Quality
I-Chun Weng, Tzung-Her Chen, Vol. 19, No. 6, 2017, pp. 922-928
Article Full Text PDF

9. DDoS Attack Detection Using Unique Source IP Deviation
Ram Charan Baishya, Nozrul Hoque, and Dhruba Kumar Bhattacharyya, Vol. 19, No. 6, 2017, pp. 929-939
Article Full Text PDF

10. An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet
Libo He, Chen Yuan, Hu Xiong, and Zhiguang Qin, Vol. 19, No. 6, 2017, pp. 940-949
Article Full Text PDF

11. Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
Zhengjun Cao, Lihua Liu, Olivier Markowitch, Vol. 19, No. 6, 2017, pp. 950-954
Article Full Text PDF

12. Towards an Optimum Authentication Service Allocation and Availability in VANETs
Safi Ibrahim, Mohamed Hamdy, and Eman Shaaban, Vol. 19, No. 6, 2017, pp. 955-965
Article Full Text PDF

13. Certificateless Hybrid Signcryption Scheme with Known Session-Specific Temporary Information Security
Ming Luo, Yuwei Wan, and Donghua Huang, Vol. 19, No. 6, 2017, pp. 966-972
Article Full Text PDF

14. Revocable ABE with Bounded Ciphertext in Cloud Computing
Mohamed Ali Hamza, Jianfei Sun, Xuyun Nie, Zhiquan Qin, and Hu Xiong, Vol. 19, No. 6, 2017, pp. 973-983
Article Full Text PDF

15. Protecting Large Size Medical Images with Logistic Map Using Dynamic Parameters and Key Image
M. Y. Mohamed Parvees, J. Abdul Samath, and B. Parameswaran Bose, Vol. 19, No. 6, 2017, pp. 984-994
Article Full Text PDF

16. Confidentiality-Preserving Personal Health Records in Tele-Healthcare System Using Authenticated Certificateless Encryption
Rui Guo, Huixian Shi, Vol. 19, No. 6, 2017, pp. 995-1004
Article Full Text PDF

17. Double Verifiable Lossless Secret Sharing Based on Hyper-chaos Generated Random Grid
Hang Gao, Mengting Hu, Tiegang Gao, and Renhong Cheng, Vol. 19, No. 6, 2017, pp. 1005-1015
Article Full Text PDF

18. Coverless Text Information Hiding Method Using the Frequent Words Hash
Jianjun Zhang, Huajun Huang, Lucai Wang, Haijun Lin, Deng Gao, Vol. 19, No. 6, 2017, pp. 1016-1023
Article Full Text PDF

19. Advanced Random Time Queue Blocking for Effective Protection of Application Servers Against Low-Rate DoS Attacks
R. Kavitha1, G. Padmavathi, Vol. 19, No. 6, 2017, pp. 1024-1035
Article Full Text PDF

20. Analysis and Optimization of System Intrusion Tolerance Capacity Based on Markov
Zhiyong Luo, Bo You, Peng Wang, Jie Su, and Yi Liang, Vol. 19, No. 6, 2017, pp. 1036-1043
Article Full Text PDF

21. Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare
Yang Zhao, Pengcheng Fan, Haoting Cai, Zhiguang Qin and Hu Xiong, Vol. 19, No. 6, 2017, pp. 1044-1052
Article Full Text PDF

22. Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme
Jongho Moon, Donghoon Lee, Jaewook Jung, and Dongho Won, Vol. 19, No. 6, 2017, pp. 1053-1061
Article Full Text PDF

23. Clustering Based K-anonymity Algorithm for Privacy Preservation
Sang Ni, Mengbo Xie, Quan Qian, Vol. 19, No. 6, 2017, pp. 1062-1071
Article Full Text PDF

24. An Efficient Code Based Digital Signature Algorithm
Fang Ren, Dong Zheng, WeiJing Wang, Vol. 19, No. 6, 2017, pp. 1072-1079
Article Full Text PDF

25. Reviewer index to volume 19 (2017)
Article Full Text PDF