International Journal of Network Security | ||
1. | A Survey of Reversible Data Hiding for VQ-Compressed Images
|
|
Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang, Vol. 20, No. 1, 2018, pp. 1-8 Article Full Text PDF |
||
2. | Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme
|
|
M. Seshadri Srinath, V. Chandrasekaran, Vol. 20, No. 1, 2018, pp. 9-18 Article Full Text PDF |
||
3. | New Protocol E-DNSSEC to Enhance DNSSEC Security
|
|
Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji, Vol. 20, No. 1, 2018, pp. 19-24 Article Full Text PDF |
||
4. | New Intrusion Detection System Based on Support Vector Domain Description with Information Gain Metric
|
|
Mohamed El Boujnouni and Mohamed Jedra, Vol. 20, No. 1, 2018, pp. 25-34 Article Full Text PDF |
||
5. | Establishing Systems Secure from Research with Implementation in Encryption Algorithms
|
|
Mikhail Styugin, Vol. 20, No. 1, 2018, pp. 35-40 Article Full Text PDF |
||
6. | A Hybrid Intrusion Detection System: Integrating Hybrid Feature Selection Approach with Heterogeneous Ensemble of Intelligent Classifiers
|
|
Amrita and Kiran Kumar Ravulakollu, Vol. 20, No. 1, 2018, pp. 41-55 Article Full Text PDF |
||
7. | Distributed Intrusion Detection System Based on Mixed Cooperative and Non-Cooperative Game Theoretical Model
|
|
Amin Nezarat, Vol. 20, No. 1, 2018, pp. 56-64 Article Full Text PDF |
||
8. | Generalized PVO-K Embedding Technique for Reversible Data Hiding
|
|
Jian-Jun Li, Yun-He Wu, Chin-Feng Lee and Chin-Chen Chang, Vol. 20, No. 1, 2018, pp. 65-77 Article Full Text PDF |
||
9. | An Efficient Confidentiality Preserving Scheme Using Certificateless Encryption with High Trust Level
|
|
Rui Guo, Huixian Shi, Vol. 20, No. 1, 2018, pp. 78-87 Article Full Text PDF |
||
10. | Provably Secure Quantum Key Distribution By Applying Quantum Gate
|
|
V. Padmavathi, B. Vishnu Vardhan, A. V. N. Krishna, Vol. 20, No. 1, 2018, pp. 88-94 Article Full Text PDF |
||
11. | Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation
|
|
Nyamsuren Vaanchig, Hu Xiong, Wei Chen, Zhiguang Qin, Vol. 20, No. 1, 2018, pp. 95-109 Article Full Text PDF |
||
12. | A Secure and Efficient Image Encryption Algorithm Based on DNA Coding and Spatiotemporal Chaos
|
|
Xiaodong Li, Cailan Zhou, Ning Xu, Vol. 20, No. 1, 2018, pp. 110-120 Article Full Text PDF |
||
13. | Cost Analysis for Classification-based Autonomous Response Systems
|
|
Yudha Purwanto, Kuspriyanto, Hendrawan, Budi Rahardjo, Vol. 20, No. 1, 2018, pp. 121-130 Article Full Text PDF |
||
14. | Mutual Information-based Intrusion Detection Model for Industrial Internet
|
|
Rui-Hong Dong, Dong-Fang Wu, Qiu-Yu Zhang and Hong-Xiang Duan, Vol. 20, No. 1, 2018, pp. 131-140 Article Full Text PDF |
||
15. | A New Approach to Quantify Network Security by Ranking of Security Metrics and Considering Their Relationships
|
|
Mostafa Behi, Mohammad GhasemiGol, and Hamed Vahdat-Nejad, Vol. 20, No. 1, 2018, pp. 141-148 Article Full Text PDF |
||
16. | An Improved Ownership Transfer for RFID Protocol
|
|
Rui Xie, Bi-yuan Jian, and Dao-wei Liu, Vol. 20, No. 1, 2018, pp. 149-156 Article Full Text PDF |
||
17. | Dynamic Trust Model for Vehicular Cyber-Physical Systems
|
|
Hongzhuan Zhao, Dihua Sun, Hang Yue, Min Zhao, Senlin Cheng, Vol. 20, No. 1, 2018, pp. 157-167 Article Full Text PDF |
||
18. | Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption
|
|
Leyou Zhang, Hongjian Yin, Vol. 20, No. 1, 2018, pp. 168-176 Article Full Text PDF |
||
19. | CAES Cryptosystem: Advanced Security Tests and Results
|
|
Said Bouchkaren, Saiida Lazaar, Vol. 20, No. 1, 2018, pp. 177-183 Article Full Text PDF |
||
20. | Dynamic Ant Colony System with Three Level Update Feature Selection for Intrusion Detection
|
|
Helmi Md Rais, Tahir Mehmood, Vol. 20, No. 1, 2018, pp. 184-192 Article Full Text PDF |
||
21. | Array Erasure Codes with Preset Fault Tolerance Capability
|
|
Dan Tang, Ya-Qiang Wang, Hao-Peng Yang, Vol. 20, No. 1, 2018, pp. 193-200 Article Full Text PDF |
||
22. | Subject index to volume 20 (2018)
|
|
Article Full Text PDF | ||
23. | Author index to volume 20 (2018)
|
|
Article Full Text PDF | ||
24. | Reviewer index to volume 20 (2018)
|
|
Article Full Text PDF | ||
25. | All Papers to volume 20 (2018)
|
|
Article Full Text PDF | ||