| International Journal of Network Security | ||
| 1. | The Capacity Analysis in the Secure Cooperative Communication System
|
|
| Jong-Shin Chen, Cheng-Ying Yang, Min-Shiang Hwang, Vol. 19, No. 6, 2017, pp. 863-869 Article Full Text PDF |
||
| 2. | A New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card
|
|
| Mourade Azrour, Yousef Farhaoui, Mohammed Ouanan, Vol. 19, No. 6, 2017, pp. 870-879 Article Full Text PDF |
||
| 3. | The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set
|
|
| Rui-Hong Dong, Dong-Fang Wu, Qiu-Yu Zhang, Vol. 19, No. 6, 2017, pp. 880-888 Article Full Text PDF |
||
| 4. | A New Mutuel Kerberos Authentication Protocol for Distributed Systems
|
|
| Zakariae Tbatou, Ahmed Asimi, Younes Asimi, Yassine Sadqi, Azidine Guezzaz, Vol. 19, No. 6, 2017, pp. 889-898 Article Full Text PDF |
||
| 5. | Further Characterization of H Vectorial Functions
|
|
| Yuwei Xu, Chuankun Wu, Vol. 19, No. 6, 2017, pp. 899-903 Article Full Text PDF |
||
| 6. | A Robust and Efficient Remote Authentication Scheme from Elliptic Curve Cryptosystem
|
|
| Guifa Hou, Zhijie Wang, Vol. 19, No. 6, 2017, pp. 904-911 Article Full Text PDF |
||
| 7. | Secure Data Outsourcing on Cloud Using Secret Sharing Scheme
|
|
| Arup Kumar Chattopadhyay, Amitava Nag, Koushik Majumder, Vol. 19, No. 6, 2017, pp. 912-921 Article Full Text PDF |
||
| 8. | A Novel Weighted Visual Cryptography Scheme with High Visual Quality
|
|
| I-Chun Weng, Tzung-Her Chen, Vol. 19, No. 6, 2017, pp. 922-928 Article Full Text PDF |
||
| 9. | DDoS Attack Detection Using Unique Source IP Deviation
|
|
| Ram Charan Baishya, Nozrul Hoque, and Dhruba Kumar Bhattacharyya, Vol. 19, No. 6, 2017, pp. 929-939 Article Full Text PDF |
||
| 10. | An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet
|
|
| Libo He, Chen Yuan, Hu Xiong, and Zhiguang Qin, Vol. 19, No. 6, 2017, pp. 940-949 Article Full Text PDF |
||
| 11. | Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
|
|
| Zhengjun Cao, Lihua Liu, Olivier Markowitch, Vol. 19, No. 6, 2017, pp. 950-954 Article Full Text PDF |
||
| 12. | Towards an Optimum Authentication Service Allocation and Availability in VANETs
|
|
| Safi Ibrahim, Mohamed Hamdy, and Eman Shaaban, Vol. 19, No. 6, 2017, pp. 955-965 Article Full Text PDF |
||
| 13. | Certificateless Hybrid Signcryption Scheme with Known Session-Specific Temporary Information Security
|
|
| Ming Luo, Yuwei Wan, and Donghua Huang, Vol. 19, No. 6, 2017, pp. 966-972 Article Full Text PDF |
||
| 14. | Revocable ABE with Bounded Ciphertext in Cloud Computing
|
|
| Mohamed Ali Hamza, Jianfei Sun, Xuyun Nie, Zhiquan Qin, and Hu Xiong, Vol. 19, No. 6, 2017, pp. 973-983 Article Full Text PDF |
||
| 15. | Protecting Large Size Medical Images with Logistic Map Using Dynamic Parameters and Key Image
|
|
| M. Y. Mohamed Parvees, J. Abdul Samath, and B. Parameswaran Bose, Vol. 19, No. 6, 2017, pp. 984-994 Article Full Text PDF |
||
| 16. | Confidentiality-Preserving Personal Health Records in Tele-Healthcare System Using Authenticated Certificateless Encryption
|
|
| Rui Guo, Huixian Shi, Vol. 19, No. 6, 2017, pp. 995-1004 Article Full Text PDF |
||
| 17. | Double Verifiable Lossless Secret Sharing Based on Hyper-chaos Generated Random Grid
|
|
| Hang Gao, Mengting Hu, Tiegang Gao, and Renhong Cheng, Vol. 19, No. 6, 2017, pp. 1005-1015 Article Full Text PDF |
||
| 18. | Coverless Text Information Hiding Method Using the Frequent Words Hash
|
|
| Jianjun Zhang, Huajun Huang, Lucai Wang, Haijun Lin, Deng Gao, Vol. 19, No. 6, 2017, pp. 1016-1023 Article Full Text PDF |
||
| 19. | Advanced Random Time Queue Blocking for Effective Protection of Application Servers Against Low-Rate DoS Attacks
|
|
| R. Kavitha1, G. Padmavathi, Vol. 19, No. 6, 2017, pp. 1024-1035 Article Full Text PDF |
||
| 20. | Analysis and Optimization of System Intrusion Tolerance Capacity Based on Markov
|
|
| Zhiyong Luo, Bo You, Peng Wang, Jie Su, and Yi Liang, Vol. 19, No. 6, 2017, pp. 1036-1043 Article Full Text PDF |
||
| 21. | Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare
|
|
| Yang Zhao, Pengcheng Fan, Haoting Cai, Zhiguang Qin and Hu Xiong, Vol. 19, No. 6, 2017, pp. 1044-1052 Article Full Text PDF |
||
| 22. | Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme
|
|
| Jongho Moon, Donghoon Lee, Jaewook Jung, and Dongho Won, Vol. 19, No. 6, 2017, pp. 1053-1061 Article Full Text PDF |
||
| 23. | Clustering Based K-anonymity Algorithm for Privacy Preservation
|
|
| Sang Ni, Mengbo Xie, Quan Qian, Vol. 19, No. 6, 2017, pp. 1062-1071 Article Full Text PDF |
||
| 24. | An Efficient Code Based Digital Signature Algorithm
|
|
| Fang Ren, Dong Zheng, WeiJing Wang, Vol. 19, No. 6, 2017, pp. 1072-1079 Article Full Text PDF |
||
| 25. | Reviewer index to volume 19 (2017)
|
|
| Article Full Text PDF | ||