International Journal of Network Security | ||
1. | Multi-proxy Multi-signature without Pairing from Certificateless Cryptography
|
|
Rena Ehmet, Lunzhi Deng, Yingying Zhang, Jiwen Zeng, Vol. 20, No. 3, 2018, pp. 403-413 Article Full Text PDF |
||
2. | A Lightweight Authentication Protocol in Smart Grid
|
|
Debsmita Ghosh, Celia Li, Cungang Yang, Vol. 20, No. 3, 2018, pp. 414-422 Article Full Text PDF |
||
3. | Soft Biometrics Traits for Continuous Authentication in Online Exam Using ICA Based Facial Recognition
|
|
Prakash Annamalai, Krishnaveni Raju, and Dhanalakshmi Ranganayakulu, Vol. 20, No. 3, 2018, pp. 423-432 Article Full Text PDF |
||
4. | Feasibility of Eliminating IDPS Devices from a Web Server Farm
|
|
Sujatha Sivabalan, P. J. Radcliffe, Vol. 20, No. 3, 2018, pp. 433-438 Article Full Text PDF |
||
5. | A Novel Physical Channel Characteristics-based Channel Hopping Scheme for Jamming-resistant in Wireless Communication
|
|
Qiuhua Wang, Hongxia Zhang, Qiuyun Lyu, Xiaojun Wang, And Jianrong Bao, Vol. 20, No. 3, 2018, pp. 439-446 Article Full Text PDF |
||
6. | DNA Cryptography for Secure Data Storage in Cloud
|
|
Sreeja Cherillath Sukumaran, Misbahuddin Mohammed, Vol. 20, No. 3, 2018, pp. 447-454 Article Full Text PDF |
||
7. | A New SPN Type Architecture to Strengthen Block Cipher Against Fault Attack
|
|
Gitika Maity, Jaydeb Bhaumik, Anjan Kundu, Vol. 20, No. 3, 2018, pp. 455-462 Article Full Text PDF |
||
8. | Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture
|
|
Hongfeng Zhu, Junlin Liu, Vol. 20, No. 3, 2018, pp. 463-471 Article Full Text PDF |
||
9. | Cubic Medium Field Equation Public Key Cryptosystem
|
|
Gang Lu, Linyuan Xuan, Xuyun Nie, Zhiguang Qin, Bo Liu, Vol. 20, No. 3, 2018, pp. 472-477 Article Full Text PDF |
||
10. | An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes
|
|
Chin-Chen Chang, Ngoc-Tu Huynh, Yu-Kai Wang, Yanjun Liu, Vol. 20, No. 3, 2018, pp. 478-488 Article Full Text PDF |
||
11. | IoT-based Efficient Tamper Detection Mechanism for Healthcare Application
|
|
Ahmed A. Elngar, Vol. 20, No. 3, 2018, pp. 489-495 Article Full Text PDF |
||
12. | Energy Aware and Trust Based Cluster Head Selection for Ad-hoc Sensor Networks
|
|
Zhe Wei and Shuyan Yu, Vol. 20, No. 3, 2018, pp. 496-501 Article Full Text PDF |
||
13. | A Data Sorting and Searching Scheme Based on Distributed Asymmetric Searchable Encryption
|
|
Lina Zou, Xueying Wang, Shoulin Yin, Vol. 20, No. 3, 2018, pp. 502-508 Article Full Text PDF |
||
14. | Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle
|
|
Gang Lu, Linyuan Xue, Xuyun Nie, Zhiguang Qin, Vol. 20, No. 3, 2018, pp. 509-514 Article Full Text PDF |
||
15. | Global Stability of Worm Propagation Model with Nonlinear Incidence Rate in Computer Network
|
|
Ranjit Kumar Upadhyay and Sangeeta Kumari, Vol. 20, No. 3, 2018, pp. 515-526 Article Full Text PDF |
||
16. | A Reusable Multipartite Secret Sharing Scheme Based on Superincreasing Sequence
|
|
Putla Harsha, Patibandla Chanakya, and Vadlamudi China Venkaiah, Vol. 20, No. 3, 2018, pp. 527-535 Article Full Text PDF |
||
17. | Secure Time Synchronization Protocol for Wireless Sensor Network Based on µTESLA Protocol
|
|
Xiaogang Wang and Weiren Shi, Vol. 20, No. 3, 2018, pp. 536-546 Article Full Text PDF |
||
18. | Survey of Peer-to-Peer Botnets and Detection Frameworks
|
|
Ramesh Singh Rawat, Emmanuel S. Pilli, and R. C. Joshi, Vol. 20, No. 3, 2018, pp. 547-557 Article Full Text PDF |
||
19. | Bayesian-Boolean Logic Security Assessment Model for Malware-Free Intrusions
|
|
Aaron Zimba, Hongsong Chen, and Zhaoshun Wang, Vol. 20, No. 3, 2018, pp. 558-567 Article Full Text PDF |
||
20. | Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle
|
|
Chandrashekhar Meshram, Sarita Gajbhiye Meshram, and Cheng-Chi Lee, Vol. 20, No. 3, 2018, pp. 568-574 Article Full Text PDF |
||
21. | Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing
|
|
Huiying Hou, Jia Yu, and Rong Hao, Vol. 20, No. 3, 2018, pp. 575-584 Article Full Text PDF |
||
22. | IDS Against Black-Hole Attack for MANET
|
|
Mohamed Abd-El-Azim, Hossam EL-Din Salah, and Menas Ebrahim, Vol. 20, No. 3, 2018, pp. 585-592 Article Full Text PDF |
||
23. | Network Security Situation Awareness Based on the Optimized Dynamic Wavelet Neural Network
|
|
Huang Cong, Wang Chao, Vol. 20, No. 3, 2018, pp. 593-600 Article Full Text PDF |
||
24. | Subject index to volume 20 (2018)
|
|
Article Full Text PDF | ||
25. | Author index to volume 20 (2018)
|
|
Article Full Text PDF | ||
26. | Reviewer index to volume 20 (2018)
|
|
Article Full Text PDF | ||
27. | All Papers to volume 20 (2018)
|
|
Article Full Text PDF | ||