Quick Search:

Volume: 20, No: 1 (January 1, 2018)

International Journal of Network Security

1. A Survey of Reversible Data Hiding for VQ-Compressed Images
Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang, Vol. 20, No. 1, 2018, pp. 1-8
Article Full Text PDF

2. Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme
M. Seshadri Srinath, V. Chandrasekaran, Vol. 20, No. 1, 2018, pp. 9-18
Article Full Text PDF

3. New Protocol E-DNSSEC to Enhance DNSSEC Security
Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji, Vol. 20, No. 1, 2018, pp. 19-24
Article Full Text PDF

4. New Intrusion Detection System Based on Support Vector Domain Description with Information Gain Metric
Mohamed El Boujnouni and Mohamed Jedra, Vol. 20, No. 1, 2018, pp. 25-34
Article Full Text PDF

5. Establishing Systems Secure from Research with Implementation in Encryption Algorithms
Mikhail Styugin, Vol. 20, No. 1, 2018, pp. 35-40
Article Full Text PDF

6. A Hybrid Intrusion Detection System: Integrating Hybrid Feature Selection Approach with Heterogeneous Ensemble of Intelligent Classifiers
Amrita and Kiran Kumar Ravulakollu, Vol. 20, No. 1, 2018, pp. 41-55
Article Full Text PDF

7. Distributed Intrusion Detection System Based on Mixed Cooperative and Non-Cooperative Game Theoretical Model
Amin Nezarat, Vol. 20, No. 1, 2018, pp. 56-64
Article Full Text PDF

8. Generalized PVO-K Embedding Technique for Reversible Data Hiding
Jian-Jun Li, Yun-He Wu, Chin-Feng Lee and Chin-Chen Chang, Vol. 20, No. 1, 2018, pp. 65-77
Article Full Text PDF

9. An Efficient Confidentiality Preserving Scheme Using Certificateless Encryption with High Trust Level
Rui Guo, Huixian Shi, Vol. 20, No. 1, 2018, pp. 78-87
Article Full Text PDF

10. Provably Secure Quantum Key Distribution By Applying Quantum Gate
V. Padmavathi, B. Vishnu Vardhan, A. V. N. Krishna, Vol. 20, No. 1, 2018, pp. 88-94
Article Full Text PDF

11. Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation
Nyamsuren Vaanchig, Hu Xiong, Wei Chen, Zhiguang Qin, Vol. 20, No. 1, 2018, pp. 95-109
Article Full Text PDF

12. A Secure and Efficient Image Encryption Algorithm Based on DNA Coding and Spatiotemporal Chaos
Xiaodong Li, Cailan Zhou, Ning Xu, Vol. 20, No. 1, 2018, pp. 110-120
Article Full Text PDF

13. Cost Analysis for Classification-based Autonomous Response Systems
Yudha Purwanto, Kuspriyanto, Hendrawan, Budi Rahardjo, Vol. 20, No. 1, 2018, pp. 121-130
Article Full Text PDF

14. Mutual Information-based Intrusion Detection Model for Industrial Internet
Rui-Hong Dong, Dong-Fang Wu, Qiu-Yu Zhang and Hong-Xiang Duan, Vol. 20, No. 1, 2018, pp. 131-140
Article Full Text PDF

15. A New Approach to Quantify Network Security by Ranking of Security Metrics and Considering Their Relationships
Mostafa Behi, Mohammad GhasemiGol, and Hamed Vahdat-Nejad, Vol. 20, No. 1, 2018, pp. 141-148
Article Full Text PDF

16. An Improved Ownership Transfer for RFID Protocol
Rui Xie, Bi-yuan Jian, and Dao-wei Liu, Vol. 20, No. 1, 2018, pp. 149-156
Article Full Text PDF

17. Dynamic Trust Model for Vehicular Cyber-Physical Systems
Hongzhuan Zhao, Dihua Sun, Hang Yue, Min Zhao, Senlin Cheng, Vol. 20, No. 1, 2018, pp. 157-167
Article Full Text PDF

18. Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption
Leyou Zhang, Hongjian Yin, Vol. 20, No. 1, 2018, pp. 168-176
Article Full Text PDF

19. CAES Cryptosystem: Advanced Security Tests and Results
Said Bouchkaren, Saiida Lazaar, Vol. 20, No. 1, 2018, pp. 177-183
Article Full Text PDF

20. Dynamic Ant Colony System with Three Level Update Feature Selection for Intrusion Detection
Helmi Md Rais, Tahir Mehmood, Vol. 20, No. 1, 2018, pp. 184-192
Article Full Text PDF

21. Array Erasure Codes with Preset Fault Tolerance Capability
Dan Tang, Ya-Qiang Wang, Hao-Peng Yang, Vol. 20, No. 1, 2018, pp. 193-200
Article Full Text PDF

22. Subject index to volume 20 (2018)
Article Full Text PDF

23. Author index to volume 20 (2018)
Article Full Text PDF

24. Reviewer index to volume 20 (2018)
Article Full Text PDF

25. All Papers to volume 20 (2018)
Article Full Text PDF