Quick Search:

Volume: 20, No: 2 (March 1, 2018)

International Journal of Network Security

1. A Secure Group Signature Scheme
Cheng-Yi Tsai, Pi-Fang Ho, Min-Shiang Hwang, Vol. 20, No. 2, 2018, pp. 201-205
Article Full Text PDF

2. Robust Speech Perception Hashing Authentication Algorithm Based on Spectral Subtraction and Multi-feature Tensor
Yi-Bo Huang, Qiu-Yu Zhang, Wen-Jin Hu, Vol. 20, No. 2, 2018, pp. 206-216
Article Full Text PDF

3. Cryptanalysis of Design and Analysis of a Provably Secure Multi-server Authentication Scheme
Naresh Babu Muthu Mohan, Ardhani Sathya Narayana Chakravarthy, Cherukuri Ravindranath, Vol. 20, No. 2, 2018, pp. 217-224
Article Full Text PDF

4. Defeating Cyber Attacks Due to Script Injection
Debasish Das, Dhruba Kumar Bhattacharyya, Vol. 20, No. 2, 2018, pp. 225-234
Article Full Text PDF

5. New Kind of Delegation-based Anonymous Authentication Scheme for Wireless Roaming Networks
Chun-Lin Jiang, Shi-Lan Wu, Ke Gu, Vol. 20, No. 2, 2018, pp. 235-242
Article Full Text PDF

6. HKDS: A Hierarchical Key Distribution Scheme for Wireless Ad Hoc Network
Kakali Chatterjee and Lalita Priya, Vol. 20, No. 2, 2018, pp. 243-255
Article Full Text PDF

7. Design of an AES Device as Device Under Test in a DPA Attack
Septafiansyah Dwi Putra, Ma'muri, Sarwono Sutikno, Yusuf Kurniawan, Adang Suwandi Ahmad, Vol. 20, No. 2, 2018, pp. 256-265
Article Full Text PDF

8. Certificate-based Smooth Projective Hashing and Its Applications
Sujuan Li, Yi Mu, and Mingwu Zhang, Vol. 20, No. 2, 2018, pp. 266-277
Article Full Text PDF

9. A Study of Non-Abelian Public Key
Tzu-Chun Lin, Vol. 20, No. 2, 2018, pp. 278-290
Article Full Text PDF

10. Evidence Based Trust Estimation Model for Cloud Computing Services
Shilpa Deshpande, Rajesh Ingle, Vol. 20, No. 2, 2018, pp. 291-303
Article Full Text PDF

11. Power Efficient Secure Web Servers
Sujatha Sivabalan, P. J. Radcliffe, Vol. 20, No. 2, 2018, pp. 304-312
Article Full Text PDF

12. A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography
Hongfeng Zhu, Rui Wang, Vol. 20, No. 2, 2018, pp. 313-322
Article Full Text PDF

13. A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications
Cheng Guo, Chin-Chen Chang, Shih-Chang Chang, Vol. 20, No. 2, 2018, pp. 323-331
Article Full Text PDF

14. A Generalize Estimating the Ø(n) of Upper-Lower Bound to RSA Public Key Crytosystem
Jie Fang, Chenglian Liu, Vol. 20, No. 2, 2018, pp. 332-336
Article Full Text PDF

15. Secure and Efficient Authentication Protocol for Power System Computer Networks
Celia Li, Helen Cheung and Cungang Yang, Vol. 20, No. 2, 2018, pp. 337-344
Article Full Text PDF

16. Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model
Mojahed Mohamed, Xiaofen Wang, and Xiaosong Zhang, Vol. 20, No. 2, 2018, pp. 345-358
Article Full Text PDF

17. Traffic Characteristic Map-based Intrusion Detection Model for Industrial Internet
Rui-Hong Dong, Dong-Fang Wu, Qiu-Yu Zhang and Tao Zhang, Vol. 20, No. 2, 2018, pp. 359-370
Article Full Text PDF

18. New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism
Mohamed Rasslan, Ghada Elkabbany, Heba Aslan, Vol. 20, No. 2, 2018, pp. 371-380
Article Full Text PDF

19. Detection of Impersonation Attack in MANET Using Polynomial Reduction Algorithm
P. Kavitha, Rajeswari Mukesh, Vol. 20, No. 2, 2018, pp. 381-389
Article Full Text PDF

20. A New Remote Authentication Scheme for Anonymous Users Using Elliptic Curves Cryptosystem
Xueqin Zhang, Baoping Wang, Wei Wang, Vol. 20, No. 2, 2018, pp. 390-395
Article Full Text PDF

21. A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application
Shin-Yan Chiou, Wen-Tsai Ko, Erl-Huei Lu, Vol. 20, No. 2, 2018, pp. 396-402
Article Full Text PDF

22. Subject index to volume 20 (2018)
Article Full Text PDF

23. Author index to volume 20 (2018)
Article Full Text PDF

24. Reviewer index to volume 20 (2018)
Article Full Text PDF

25. All Papers to volume 20 (2018)
Article Full Text PDF