| International Journal of Network Security | ||
| 1. | Multi-proxy Multi-signature without Pairing from Certificateless Cryptography
|
|
| Rena Ehmet, Lunzhi Deng, Yingying Zhang, Jiwen Zeng, Vol. 20, No. 3, 2018, pp. 403-413 Article Full Text PDF |
||
| 2. | A Lightweight Authentication Protocol in Smart Grid
|
|
| Debsmita Ghosh, Celia Li, Cungang Yang, Vol. 20, No. 3, 2018, pp. 414-422 Article Full Text PDF |
||
| 3. | Soft Biometrics Traits for Continuous Authentication in Online Exam Using ICA Based Facial Recognition
|
|
| Prakash Annamalai, Krishnaveni Raju, and Dhanalakshmi Ranganayakulu, Vol. 20, No. 3, 2018, pp. 423-432 Article Full Text PDF |
||
| 4. | Feasibility of Eliminating IDPS Devices from a Web Server Farm
|
|
| Sujatha Sivabalan, P. J. Radcliffe, Vol. 20, No. 3, 2018, pp. 433-438 Article Full Text PDF |
||
| 5. | A Novel Physical Channel Characteristics-based Channel Hopping Scheme for Jamming-resistant in Wireless Communication
|
|
| Qiuhua Wang, Hongxia Zhang, Qiuyun Lyu, Xiaojun Wang, And Jianrong Bao, Vol. 20, No. 3, 2018, pp. 439-446 Article Full Text PDF |
||
| 6. | DNA Cryptography for Secure Data Storage in Cloud
|
|
| Sreeja Cherillath Sukumaran, Misbahuddin Mohammed, Vol. 20, No. 3, 2018, pp. 447-454 Article Full Text PDF |
||
| 7. | A New SPN Type Architecture to Strengthen Block Cipher Against Fault Attack
|
|
| Gitika Maity, Jaydeb Bhaumik, Anjan Kundu, Vol. 20, No. 3, 2018, pp. 455-462 Article Full Text PDF |
||
| 8. | Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture
|
|
| Hongfeng Zhu, Junlin Liu, Vol. 20, No. 3, 2018, pp. 463-471 Article Full Text PDF |
||
| 9. | Cubic Medium Field Equation Public Key Cryptosystem
|
|
| Gang Lu, Linyuan Xuan, Xuyun Nie, Zhiguang Qin, Bo Liu, Vol. 20, No. 3, 2018, pp. 472-477 Article Full Text PDF |
||
| 10. | An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes
|
|
| Chin-Chen Chang, Ngoc-Tu Huynh, Yu-Kai Wang, Yanjun Liu, Vol. 20, No. 3, 2018, pp. 478-488 Article Full Text PDF |
||
| 11. | IoT-based Efficient Tamper Detection Mechanism for Healthcare Application
|
|
| Ahmed A. Elngar, Vol. 20, No. 3, 2018, pp. 489-495 Article Full Text PDF |
||
| 12. | Energy Aware and Trust Based Cluster Head Selection for Ad-hoc Sensor Networks
|
|
| Zhe Wei and Shuyan Yu, Vol. 20, No. 3, 2018, pp. 496-501 Article Full Text PDF |
||
| 13. | A Data Sorting and Searching Scheme Based on Distributed Asymmetric Searchable Encryption
|
|
| Lina Zou, Xueying Wang, Shoulin Yin, Vol. 20, No. 3, 2018, pp. 502-508 Article Full Text PDF |
||
| 14. | Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle
|
|
| Gang Lu, Linyuan Xue, Xuyun Nie, Zhiguang Qin, Vol. 20, No. 3, 2018, pp. 509-514 Article Full Text PDF |
||
| 15. | Global Stability of Worm Propagation Model with Nonlinear Incidence Rate in Computer Network
|
|
| Ranjit Kumar Upadhyay and Sangeeta Kumari, Vol. 20, No. 3, 2018, pp. 515-526 Article Full Text PDF |
||
| 16. | A Reusable Multipartite Secret Sharing Scheme Based on Superincreasing Sequence
|
|
| Putla Harsha, Patibandla Chanakya, and Vadlamudi China Venkaiah, Vol. 20, No. 3, 2018, pp. 527-535 Article Full Text PDF |
||
| 17. | Secure Time Synchronization Protocol for Wireless Sensor Network Based on µTESLA Protocol
|
|
| Xiaogang Wang and Weiren Shi, Vol. 20, No. 3, 2018, pp. 536-546 Article Full Text PDF |
||
| 18. | Survey of Peer-to-Peer Botnets and Detection Frameworks
|
|
| Ramesh Singh Rawat, Emmanuel S. Pilli, and R. C. Joshi, Vol. 20, No. 3, 2018, pp. 547-557 Article Full Text PDF |
||
| 19. | Bayesian-Boolean Logic Security Assessment Model for Malware-Free Intrusions
|
|
| Aaron Zimba, Hongsong Chen, and Zhaoshun Wang, Vol. 20, No. 3, 2018, pp. 558-567 Article Full Text PDF |
||
| 20. | Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle
|
|
| Chandrashekhar Meshram, Sarita Gajbhiye Meshram, and Cheng-Chi Lee, Vol. 20, No. 3, 2018, pp. 568-574 Article Full Text PDF |
||
| 21. | Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing
|
|
| Huiying Hou, Jia Yu, and Rong Hao, Vol. 20, No. 3, 2018, pp. 575-584 Article Full Text PDF |
||
| 22. | IDS Against Black-Hole Attack for MANET
|
|
| Mohamed Abd-El-Azim, Hossam EL-Din Salah, and Menas Ebrahim, Vol. 20, No. 3, 2018, pp. 585-592 Article Full Text PDF |
||
| 23. | Network Security Situation Awareness Based on the Optimized Dynamic Wavelet Neural Network
|
|
| Huang Cong, Wang Chao, Vol. 20, No. 3, 2018, pp. 593-600 Article Full Text PDF |
||
| 24. | Subject index to volume 20 (2018)
|
|
| Article Full Text PDF | ||
| 25. | Author index to volume 20 (2018)
|
|
| Article Full Text PDF | ||
| 26. | Reviewer index to volume 20 (2018)
|
|
| Article Full Text PDF | ||
| 27. | All Papers to volume 20 (2018)
|
|
| Article Full Text PDF | ||