Quick Search:

Paper Preview:

International Journal of Network Security

1. Multi-proxy Multi-signature without Pairing from Certificateless Cryptography
Rena Ehmet, Lunzhi Deng, Yingying Zhang, Jiwen Zeng
Article Full Text PDF

2. A Lightweight Authentication Protocol in Smart Grid
Debsmita Ghosh, Celia Li, Cungang Yang
Article Full Text PDF

3. Security Analysis of Discrete Event Based Threat Driven Authentication Approach in VANET Using Petri Nets
Arun Malik, Babita Pandey
Article Full Text PDF

4. Soft Biometrics Traits for Continuous Authentication in Online Exam Using ICA Based Facial Recognition
Prakash Annamalai, Krishnaveni Raju, and Dhanalakshmi Ranganayakulu
Article Full Text PDF

5. A Novel Physical Channel Characteristics-based Channel Hopping Scheme for Jamming-resistant in Wireless Communication
Qiuhua Wang, Hongxia Zhang, Qiuyun Lyu, Xiaojun Wang, And Jianrong Bao
Article Full Text PDF

6. DNA Cryptography for Secure Data Storage in Cloud
Sreeja Cherillath Sukumaran, Misbahuddin Mohammed
Article Full Text PDF

7. Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle
Gang Lu, Linyuan Xue, Xuyun Nie, Zhiguang Qin
Article Full Text PDF

8. A New SPN Type Architecture to Strengthen Block Cipher Against Fault Attack
Gitika Maity, Jaydeb Bhaumik, Anjan Kundu
Article Full Text PDF

9. Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture
Hongfeng Zhu, Junlin Liu
Article Full Text PDF

10. Cubic Medium Field Equation Public Key Cryptosystem
Gang Lu, Linyuan Xuan, Xuyun Nie, Zhiguang Qin, Bo Liu
Article Full Text PDF

11. An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes
Chin-Chen Chang, Ngoc-Tu Huynh, Yu-Kai Wang, Yanjun Liu
Article Full Text PDF

12. IoT-based Efficient Tamper Detection Mechanism for Healthcare Application
Ahmed A. Elngar
Article Full Text PDF

13. Energy Aware and Trust Based Cluster Head Selection for Ad-hoc Sensor Networks
Zhe Wei and Shuyan Yu
Article Full Text PDF

14. A Data Sorting and Searching Scheme Based on Asymmetric Searchable Encryption in Cloud Environment
Lina Zou, Xueying Wang, Shoulin Yin
Article Full Text PDF

15. Feasibility of Eliminating IDPS Devices from a Web Server Farm
Sujatha Sivabalan, P. J. Radcliffe
Article Full Text PDF

16. A Cryptographic and Trust Based Security Outlook in Mobile Ad Hoc Networks
JANANI V S, M S K MANIKANDAN
Article Full Text PDF

17. A multipartite secret sharing scheme based on superincreasing sequence
Harsha Putla, Patibandla Chanakya, V. ch. venkaiah
Article Full Text PDF

18. Global stability of worm propagation model with nonlinear incidence rate in computer network
Ranjit Kumar Upadhyay, Sangeeta Kumari
Article Full Text PDF

19. Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
Zhengjun Cao, Chong Mao, Lihua Liu, Wenping Kong, Jinbo Wang
Article Full Text PDF

20. Application of Video Watermarking Using Subdivision Technique to Enhance Information Security
M. A. Gangarde, J. S. Chitode
Article Full Text PDF

21. Scalable Approach Towards Discovery of Unknown Vulnerabilities
Umesh Kumar Singh, Chanchala Joshi
Article Full Text PDF

22. Application of FSM Machine and S-Box in KASUMI Block Cipher to Improve Its Resistance Against Attack
Raja Muthalagu and Subeen Jain
Article Full Text PDF

23. Detection and Analysis Cerber Ransomware Using Network Forensics Behavior Based
Ade Kurniawan and Imam Riadi
Article Full Text PDF

24. A New Scheme for Source-location Privacy in Wireless Sensor Networks
Shaoquan Jiang, Min Li, and Zailiang Tang
Article Full Text PDF

25. Network Security Situation Awareness Based on the Optimized Dynamic Wavelet Neural Network
Huang Cong, Wang Chao
Article Full Text PDF

26. CP-ABE for Selective Access with Scalable Revocation: A Case Study for Mobile-based Healthfolder
Divyashikha Sethia, Huzur Saran, Daya Gupta
Article Full Text PDF

27. Data Verification Using Block Level Batch Auditing on Multi-cloud Server
G. L. Prakash, Manish Prateek, and Inder Singh
Article Full Text PDF

28. A New Access Control System Based on CP-ABE
Tao Feng, Jiaqi Guo
Article Full Text PDF

29. Defense Techniques of SYN Flood Attack Characterization and Comparisons
Shaila Ghanti, G. M. Naik
Article Full Text PDF

30. Benchmark Datasets for Network Intrusion Detection: a Review
Yasir Hamid, V. R. Balasaraswathi, Ludovic Journaux, M. Sugumaran
Article Full Text PDF

31. Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust
Vegi Srinivas, Vatsavayi Valli Kumari, KVSVN Raju
Article Full Text PDF

32. Traceable Certificateless Ring Signature Scheme for no Full Anonymous Applications
Ke Gu
Article Full Text PDF

33. Survey of Peer-to-Peer Botnets and Detection Frameworks
Emmanuel S Pilli
Article Full Text PDF

34. Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing
Jia Yu
Article Full Text PDF

35. An Image Retrieval Algorithm Based on Gist and Sift Features
Bei XIE, Jiaohua Qin, Xuyu Xiang,Hao Li,Lili PAN
Article Full Text PDF

36. Bayesian-Boolean Logic Security Assessment Model for Malware-Free Intrusions
Aaron Zimba, Chen Hongsong, Wang Zhaoshun
Article Full Text PDF

37. A Credible Mechanism of Service about Data Resource in Cloud Computing
yunfa li,MingYi Li, Yangyang Shen
Article Full Text PDF

38. Impact of IPSec protocol on the performance of network Real-Time Applications: A reviwe
Abdullah A Al-khatib, Rosilah Hassan
Article Full Text PDF

39. IDS against Black Hole Attack for MANET
menas ebrahim eissa
Article Full Text PDF

40. An Multi-step Attack Prediction Method Based on Probabilistic Reasoning Model
Guangming Tang, Shuo Wang, Guang Kou, Yuan Bian, Wenfeng Kang
Article Full Text PDF