International Journal of Network Security | ||
1. | A Secure Group Signature Scheme
|
|
Cheng-Yi Tsai, Pi-Fang Ho, Min-Shiang Hwang, Vol. 20, No. 2, 2018, pp. 201-205 Article Full Text PDF |
||
2. | Robust Speech Perception Hashing Authentication Algorithm Based on Spectral Subtraction and Multi-feature Tensor
|
|
Yi-Bo Huang, Qiu-Yu Zhang, Wen-Jin Hu, Vol. 20, No. 2, 2018, pp. 206-216 Article Full Text PDF |
||
3. | Cryptanalysis of Design and Analysis of a Provably Secure Multi-server Authentication Scheme
|
|
Naresh Babu Muthu Mohan, Ardhani Sathya Narayana Chakravarthy, Cherukuri Ravindranath, Vol. 20, No. 2, 2018, pp. 217-224 Article Full Text PDF |
||
4. | Defeating Cyber Attacks Due to Script Injection
|
|
Debasish Das, Dhruba Kumar Bhattacharyya, Vol. 20, No. 2, 2018, pp. 225-234 Article Full Text PDF |
||
5. | New Kind of Delegation-based Anonymous Authentication Scheme for Wireless Roaming Networks
|
|
Chun-Lin Jiang, Shi-Lan Wu, Ke Gu, Vol. 20, No. 2, 2018, pp. 235-242 Article Full Text PDF |
||
6. | HKDS: A Hierarchical Key Distribution Scheme for Wireless Ad Hoc Network
|
|
Kakali Chatterjee and Lalita Priya, Vol. 20, No. 2, 2018, pp. 243-255 Article Full Text PDF |
||
7. | Design of an AES Device as Device Under Test in a DPA Attack
|
|
Septafiansyah Dwi Putra, Ma'muri, Sarwono Sutikno, Yusuf Kurniawan, Adang Suwandi Ahmad, Vol. 20, No. 2, 2018, pp. 256-265 Article Full Text PDF |
||
8. | Certificate-based Smooth Projective Hashing and Its Applications
|
|
Sujuan Li, Yi Mu, and Mingwu Zhang, Vol. 20, No. 2, 2018, pp. 266-277 Article Full Text PDF |
||
9. | A Study of Non-Abelian Public Key
|
|
Tzu-Chun Lin, Vol. 20, No. 2, 2018, pp. 278-290 Article Full Text PDF |
||
10. | Evidence Based Trust Estimation Model for Cloud Computing Services
|
|
Shilpa Deshpande, Rajesh Ingle, Vol. 20, No. 2, 2018, pp. 291-303 Article Full Text PDF |
||
11. | Power Efficient Secure Web Servers
|
|
Sujatha Sivabalan, P. J. Radcliffe, Vol. 20, No. 2, 2018, pp. 304-312 Article Full Text PDF |
||
12. | A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography
|
|
Hongfeng Zhu, Rui Wang, Vol. 20, No. 2, 2018, pp. 313-322 Article Full Text PDF |
||
13. | A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications
|
|
Cheng Guo, Chin-Chen Chang, Shih-Chang Chang, Vol. 20, No. 2, 2018, pp. 323-331 Article Full Text PDF |
||
14. | A Generalize Estimating the Ø(n) of Upper-Lower Bound to RSA Public Key Crytosystem
|
|
Jie Fang, Chenglian Liu, Vol. 20, No. 2, 2018, pp. 332-336 Article Full Text PDF |
||
15. | Secure and Efficient Authentication Protocol for Power System Computer Networks
|
|
Celia Li, Helen Cheung and Cungang Yang, Vol. 20, No. 2, 2018, pp. 337-344 Article Full Text PDF |
||
16. | Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model
|
|
Mojahed Mohamed, Xiaofen Wang, and Xiaosong Zhang, Vol. 20, No. 2, 2018, pp. 345-358 Article Full Text PDF |
||
17. | Traffic Characteristic Map-based Intrusion Detection Model for Industrial Internet
|
|
Rui-Hong Dong, Dong-Fang Wu, Qiu-Yu Zhang and Tao Zhang, Vol. 20, No. 2, 2018, pp. 359-370 Article Full Text PDF |
||
18. | New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism
|
|
Mohamed Rasslan, Ghada Elkabbany, Heba Aslan, Vol. 20, No. 2, 2018, pp. 371-380 Article Full Text PDF |
||
19. | Detection of Impersonation Attack in MANET Using Polynomial Reduction Algorithm
|
|
P. Kavitha, Rajeswari Mukesh, Vol. 20, No. 2, 2018, pp. 381-389 Article Full Text PDF |
||
20. | A New Remote Authentication Scheme for Anonymous Users Using Elliptic Curves Cryptosystem
|
|
Xueqin Zhang, Baoping Wang, Wei Wang, Vol. 20, No. 2, 2018, pp. 390-395 Article Full Text PDF |
||
21. | A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application
|
|
Shin-Yan Chiou, Wen-Tsai Ko, Erl-Huei Lu, Vol. 20, No. 2, 2018, pp. 396-402 Article Full Text PDF |
||
22. | Subject index to volume 20 (2018)
|
|
Article Full Text PDF | ||
23. | Author index to volume 20 (2018)
|
|
Article Full Text PDF | ||
24. | Reviewer index to volume 20 (2018)
|
|
Article Full Text PDF | ||
25. | All Papers to volume 20 (2018)
|
|
Article Full Text PDF | ||