Quick Search:

Volume: 20, No: 4 (July 1, 2018)

International Journal of Network Security

1. Security Analysis of Discrete Event Based Threat Driven Authentication Approach in VANET Using Petri Nets
Arun Malik, Babita Pandey, Vol. 20, No. 4, 2018, pp. 601-608
Article Full Text PDF

2. An Image Retrieval Algorithm Based on Gist and Sift Features
Bei Xie, Jiaohua Qin, Xuyu Xiang, Hao Li and Lili Pan, Vol. 20, No. 4, 2018, pp. 609-616
Article Full Text PDF

3. Diffie-Hellman Type Key Exchange, ElGamal Like Encryption/Decryption and Proxy Re-encryption Using Circulant Matrices
Chitra Rajarama, Jagadeesha Narasimhamurthy Sugatoor, and T. Yerri Swamy, Vol. 20, No. 4, 2018, pp. 617-624
Article Full Text PDF

4. Performance Analysis of RSA and Elliptic Curve Cryptography
Dindayal Mahto and Dilip Kumar Yadav, Vol. 20, No. 4, 2018, pp. 625-635
Article Full Text PDF

5. Security Improvements of EPS-AKA Protocol
Mourad Abdeljebbar and Rachid El Kouch, Vol. 20, No. 4, 2018, pp. 636-644
Article Full Text PDF

6. Benchmark Datasets for Network Intrusion Detection: A Review
Yasir Hamid, V. R. Balasaraswathi, Ludovic Journaux and M. Sugumaran, Vol. 20, No. 4, 2018, pp. 645-654
Article Full Text PDF

7. An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions
Fadi Al-Ayed, Chunqiang Hu and Hang Liu, Vol. 20, No. 4, 2018, pp. 655-663
Article Full Text PDF

8. Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain
Ming Yang, Rong Jiang, Tilei Gao, Wanyu Xie and Jia Wang, Vol. 20, No. 4, 2018, pp. 664-673
Article Full Text PDF

9. Study on Trust Model for Multi-users in Cloud Computing
Xu Wu, Vol. 20, No. 4, 2018, pp. 674-682
Article Full Text PDF

10. Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
Zhengjun Cao, Chong Mao, Lihua Liu, Wenping Kong, Jinbo Wang, Vol. 20, No. 4, 2018, pp. 683-688
Article Full Text PDF

11. CP-ABE for Selective Access with Scalable Revocation: A Case Study for Mobile-based Healthfolder
Divyashikha Sethia, Huzur Saran, Daya Gupta, Vol. 20, No. 4, 2018, pp. 689-701
Article Full Text PDF

12. Data Verification Using Block Level Batch Auditing on Multi-cloud Server
G. L. Prakash, Manish Prateek, and Inder Singh, Vol. 20, No. 4, 2018, pp. 702-709
Article Full Text PDF

13. A New Access Control System Based on CP-ABE in Named Data Networking
Tao Feng, Jiaqi Guo, Vol. 20, No. 4, 2018, pp. 710-720
Article Full Text PDF

14. Defense Techniques of SYN Flood Attack Characterization and Comparisons
Shaila Ghanti, G. M. Naik, Vol. 20, No. 4, 2018, pp. 721-729
Article Full Text PDF

15. Efficient Anomaly Intrusion Detection Using Hybrid Probabilistic Techniques in Wireless Ad Hoc Network
K. Murugan and P. Suresh, Vol. 20, No. 4, 2018, pp. 730-737
Article Full Text PDF

16. Identification of Cyber Criminal by Analysing the Users Profile
K. Veena and K. Meena, Vol. 20, No. 4, 2018, pp. 738-745
Article Full Text PDF

17. An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks
V. S. Janani and M. S. K. Manikandan, Vol. 20, No. 4, 2018, pp. 746-753
Article Full Text PDF

18. A Credible Mechanism of Service about Data Resource in Cloud Computing
Yunfa Li, Yangyang Shen and Mingyi Li, Vol. 20, No. 4, 2018, pp. 754-761
Article Full Text PDF

19. Traceable Certificateless Ring Signature Scheme For No Full Anonymous Applications
Ke Gu, LinYu Wang, Na Wu and NianDong Liao, Vol. 20, No. 4, 2018, pp. 762-773
Article Full Text PDF

20. An Untraceable Voting Scheme Based on Pairs of Signatures
Kazi Md. Rokibul Alam, Adnan Maruf, Md. Rezaur Rahman Rakib, G. G. Md. Nawaz Ali, Peter Han Joo Chong, and Yasuhiko Morimoto, Vol. 20, No. 4, 2018, pp. 774-787
Article Full Text PDF

21. Multiple New Formulas for Cipher Performance Computing
Youssef Harmouch, Rachid Elkouch and Hussain Ben-Azza, Vol. 20, No. 4, 2018, pp. 788-800
Article Full Text PDF

22. A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching
Yu-Lun Wang, Jau-Ji Shen, and Min-Shiang Hwang, Vol. 20, No. 4, 2018, pp. 801-804
Article Full Text PDF

23. Defense of Computer Network Viruses Based on Data Mining Technology
Cen Zuo, Vol. 20, No. 4, 2018, pp. 805-810
Article Full Text PDF

24. Subject index to volume 20 (2018)
Article Full Text PDF

25. Author index to volume 20 (2018)
Article Full Text PDF

26. Reviewer index to volume 20 (2018)
Article Full Text PDF

27. All Papers to volume 20 (2018)
Article Full Text PDF