International Journal of Network Security | ||
1. | Security Analysis of Discrete Event Based Threat Driven Authentication Approach in VANET Using Petri Nets
|
|
Arun Malik, Babita Pandey, Vol. 20, No. 4, 2018, pp. 601-608 Article Full Text PDF |
||
2. | An Image Retrieval Algorithm Based on Gist and Sift Features
|
|
Bei Xie, Jiaohua Qin, Xuyu Xiang, Hao Li and Lili Pan, Vol. 20, No. 4, 2018, pp. 609-616 Article Full Text PDF |
||
3. | Diffie-Hellman Type Key Exchange, ElGamal Like Encryption/Decryption and Proxy Re-encryption Using Circulant Matrices
|
|
Chitra Rajarama, Jagadeesha Narasimhamurthy Sugatoor, and T. Yerri Swamy, Vol. 20, No. 4, 2018, pp. 617-624 Article Full Text PDF |
||
4. | Performance Analysis of RSA and Elliptic Curve Cryptography
|
|
Dindayal Mahto and Dilip Kumar Yadav, Vol. 20, No. 4, 2018, pp. 625-635 Article Full Text PDF |
||
5. | Security Improvements of EPS-AKA Protocol
|
|
Mourad Abdeljebbar and Rachid El Kouch, Vol. 20, No. 4, 2018, pp. 636-644 Article Full Text PDF |
||
6. | Benchmark Datasets for Network Intrusion Detection: A Review
|
|
Yasir Hamid, V. R. Balasaraswathi, Ludovic Journaux and M. Sugumaran, Vol. 20, No. 4, 2018, pp. 645-654 Article Full Text PDF |
||
7. | An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions
|
|
Fadi Al-Ayed, Chunqiang Hu and Hang Liu, Vol. 20, No. 4, 2018, pp. 655-663 Article Full Text PDF |
||
8. | Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain
|
|
Ming Yang, Rong Jiang, Tilei Gao, Wanyu Xie and Jia Wang, Vol. 20, No. 4, 2018, pp. 664-673 Article Full Text PDF |
||
9. | Study on Trust Model for Multi-users in Cloud Computing
|
|
Xu Wu, Vol. 20, No. 4, 2018, pp. 674-682 Article Full Text PDF |
||
10. | Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
|
|
Zhengjun Cao, Chong Mao, Lihua Liu, Wenping Kong, Jinbo Wang, Vol. 20, No. 4, 2018, pp. 683-688 Article Full Text PDF |
||
11. | CP-ABE for Selective Access with Scalable Revocation: A Case Study for Mobile-based Healthfolder
|
|
Divyashikha Sethia, Huzur Saran, Daya Gupta, Vol. 20, No. 4, 2018, pp. 689-701 Article Full Text PDF |
||
12. | Data Verification Using Block Level Batch Auditing on Multi-cloud Server
|
|
G. L. Prakash, Manish Prateek, and Inder Singh, Vol. 20, No. 4, 2018, pp. 702-709 Article Full Text PDF |
||
13. | A New Access Control System Based on CP-ABE in Named Data Networking
|
|
Tao Feng, Jiaqi Guo, Vol. 20, No. 4, 2018, pp. 710-720 Article Full Text PDF |
||
14. | Defense Techniques of SYN Flood Attack Characterization and Comparisons
|
|
Shaila Ghanti, G. M. Naik, Vol. 20, No. 4, 2018, pp. 721-729 Article Full Text PDF |
||
15. | Efficient Anomaly Intrusion Detection Using Hybrid Probabilistic Techniques in Wireless Ad Hoc Network
|
|
K. Murugan and P. Suresh, Vol. 20, No. 4, 2018, pp. 730-737 Article Full Text PDF |
||
16. | Identification of Cyber Criminal by Analysing the Users Profile
|
|
K. Veena and K. Meena, Vol. 20, No. 4, 2018, pp. 738-745 Article Full Text PDF |
||
17. | An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks
|
|
V. S. Janani and M. S. K. Manikandan, Vol. 20, No. 4, 2018, pp. 746-753 Article Full Text PDF |
||
18. | A Credible Mechanism of Service about Data Resource in Cloud Computing
|
|
Yunfa Li, Yangyang Shen and Mingyi Li, Vol. 20, No. 4, 2018, pp. 754-761 Article Full Text PDF |
||
19. | Traceable Certificateless Ring Signature Scheme For No Full Anonymous Applications
|
|
Ke Gu, LinYu Wang, Na Wu and NianDong Liao, Vol. 20, No. 4, 2018, pp. 762-773 Article Full Text PDF |
||
20. | An Untraceable Voting Scheme Based on Pairs of Signatures
|
|
Kazi Md. Rokibul Alam, Adnan Maruf, Md. Rezaur Rahman Rakib, G. G. Md. Nawaz Ali, Peter Han Joo Chong, and Yasuhiko Morimoto, Vol. 20, No. 4, 2018, pp. 774-787 Article Full Text PDF |
||
21. | Multiple New Formulas for Cipher Performance Computing
|
|
Youssef Harmouch, Rachid Elkouch and Hussain Ben-Azza, Vol. 20, No. 4, 2018, pp. 788-800 Article Full Text PDF |
||
22. | A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching
|
|
Yu-Lun Wang, Jau-Ji Shen, and Min-Shiang Hwang, Vol. 20, No. 4, 2018, pp. 801-804 Article Full Text PDF |
||
23. | Defense of Computer Network Viruses Based on Data Mining Technology
|
|
Cen Zuo, Vol. 20, No. 4, 2018, pp. 805-810 Article Full Text PDF |
||
24. | Subject index to volume 20 (2018)
|
|
Article Full Text PDF | ||
25. | Author index to volume 20 (2018)
|
|
Article Full Text PDF | ||
26. | Reviewer index to volume 20 (2018)
|
|
Article Full Text PDF | ||
27. | All Papers to volume 20 (2018)
|
|
Article Full Text PDF | ||