Quick Search:

Volume: 20, No: 3 (May 1, 2018)

International Journal of Network Security

1. Multi-proxy Multi-signature without Pairing from Certificateless Cryptography
Rena Ehmet, Lunzhi Deng, Yingying Zhang, Jiwen Zeng, Vol. 20, No. 3, 2018, pp. 403-413
Article Full Text PDF

2. A Lightweight Authentication Protocol in Smart Grid
Debsmita Ghosh, Celia Li, Cungang Yang, Vol. 20, No. 3, 2018, pp. 414-422
Article Full Text PDF

3. Soft Biometrics Traits for Continuous Authentication in Online Exam Using ICA Based Facial Recognition
Prakash Annamalai, Krishnaveni Raju, and Dhanalakshmi Ranganayakulu, Vol. 20, No. 3, 2018, pp. 423-432
Article Full Text PDF

4. Feasibility of Eliminating IDPS Devices from a Web Server Farm
Sujatha Sivabalan, P. J. Radcliffe, Vol. 20, No. 3, 2018, pp. 433-438
Article Full Text PDF

5. A Novel Physical Channel Characteristics-based Channel Hopping Scheme for Jamming-resistant in Wireless Communication
Qiuhua Wang, Hongxia Zhang, Qiuyun Lyu, Xiaojun Wang, And Jianrong Bao, Vol. 20, No. 3, 2018, pp. 439-446
Article Full Text PDF

6. DNA Cryptography for Secure Data Storage in Cloud
Sreeja Cherillath Sukumaran, Misbahuddin Mohammed, Vol. 20, No. 3, 2018, pp. 447-454
Article Full Text PDF

7. A New SPN Type Architecture to Strengthen Block Cipher Against Fault Attack
Gitika Maity, Jaydeb Bhaumik, Anjan Kundu, Vol. 20, No. 3, 2018, pp. 455-462
Article Full Text PDF

8. Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture
Hongfeng Zhu, Junlin Liu, Vol. 20, No. 3, 2018, pp. 463-471
Article Full Text PDF

9. Cubic Medium Field Equation Public Key Cryptosystem
Gang Lu, Linyuan Xuan, Xuyun Nie, Zhiguang Qin, Bo Liu, Vol. 20, No. 3, 2018, pp. 472-477
Article Full Text PDF

10. An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes
Chin-Chen Chang, Ngoc-Tu Huynh, Yu-Kai Wang, Yanjun Liu, Vol. 20, No. 3, 2018, pp. 478-488
Article Full Text PDF

11. IoT-based Efficient Tamper Detection Mechanism for Healthcare Application
Ahmed A. Elngar, Vol. 20, No. 3, 2018, pp. 489-495
Article Full Text PDF

12. Energy Aware and Trust Based Cluster Head Selection for Ad-hoc Sensor Networks
Zhe Wei and Shuyan Yu, Vol. 20, No. 3, 2018, pp. 496-501
Article Full Text PDF

13. A Data Sorting and Searching Scheme Based on Distributed Asymmetric Searchable Encryption
Lina Zou, Xueying Wang, Shoulin Yin, Vol. 20, No. 3, 2018, pp. 502-508
Article Full Text PDF

14. Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle
Gang Lu, Linyuan Xue, Xuyun Nie, Zhiguang Qin, Vol. 20, No. 3, 2018, pp. 509-514
Article Full Text PDF

15. Global Stability of Worm Propagation Model with Nonlinear Incidence Rate in Computer Network
Ranjit Kumar Upadhyay and Sangeeta Kumari, Vol. 20, No. 3, 2018, pp. 515-526
Article Full Text PDF

16. A Reusable Multipartite Secret Sharing Scheme Based on Superincreasing Sequence
Putla Harsha, Patibandla Chanakya, and Vadlamudi China Venkaiah, Vol. 20, No. 3, 2018, pp. 527-535
Article Full Text PDF

17. Secure Time Synchronization Protocol for Wireless Sensor Network Based on ┬ÁTESLA Protocol
Xiaogang Wang and Weiren Shi, Vol. 20, No. 3, 2018, pp. 536-546
Article Full Text PDF

18. Survey of Peer-to-Peer Botnets and Detection Frameworks
Ramesh Singh Rawat, Emmanuel S. Pilli, and R. C. Joshi, Vol. 20, No. 3, 2018, pp. 547-557
Article Full Text PDF

19. Bayesian-Boolean Logic Security Assessment Model for Malware-Free Intrusions
Aaron Zimba, Hongsong Chen, and Zhaoshun Wang, Vol. 20, No. 3, 2018, pp. 558-567
Article Full Text PDF

20. Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle
Chandrashekhar Meshram, Sarita Gajbhiye Meshram, and Cheng-Chi Lee, Vol. 20, No. 3, 2018, pp. 568-574
Article Full Text PDF

21. Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing
Huiying Hou, Jia Yu, and Rong Hao, Vol. 20, No. 3, 2018, pp. 575-584
Article Full Text PDF

22. IDS Against Black-Hole Attack for MANET
Mohamed Abd-El-Azim, Hossam EL-Din Salah, and Menas Ebrahim, Vol. 20, No. 3, 2018, pp. 585-592
Article Full Text PDF

23. Network Security Situation Awareness Based on the Optimized Dynamic Wavelet Neural Network
Huang Cong, Wang Chao, Vol. 20, No. 3, 2018, pp. 593-600
Article Full Text PDF

24. Subject index to volume 20 (2018)
Article Full Text PDF

25. Author index to volume 20 (2018)
Article Full Text PDF

26. Reviewer index to volume 20 (2018)
Article Full Text PDF

27. All Papers to volume 20 (2018)
Article Full Text PDF