| International Journal of Network Security | ||
| 1. | Security Analysis of Discrete Event Based Threat Driven Authentication Approach in VANET Using Petri Nets
|
|
| Arun Malik, Babita Pandey, Vol. 20, No. 4, 2018, pp. 601-608 Article Full Text PDF |
||
| 2. | An Image Retrieval Algorithm Based on Gist and Sift Features
|
|
| Bei Xie, Jiaohua Qin, Xuyu Xiang, Hao Li and Lili Pan, Vol. 20, No. 4, 2018, pp. 609-616 Article Full Text PDF |
||
| 3. | Diffie-Hellman Type Key Exchange, ElGamal Like Encryption/Decryption and Proxy Re-encryption Using Circulant Matrices
|
|
| Chitra Rajarama, Jagadeesha Narasimhamurthy Sugatoor, and T. Yerri Swamy, Vol. 20, No. 4, 2018, pp. 617-624 Article Full Text PDF |
||
| 4. | Performance Analysis of RSA and Elliptic Curve Cryptography
|
|
| Dindayal Mahto and Dilip Kumar Yadav, Vol. 20, No. 4, 2018, pp. 625-635 Article Full Text PDF |
||
| 5. | Security Improvements of EPS-AKA Protocol
|
|
| Mourad Abdeljebbar and Rachid El Kouch, Vol. 20, No. 4, 2018, pp. 636-644 Article Full Text PDF |
||
| 6. | Benchmark Datasets for Network Intrusion Detection: A Review
|
|
| Yasir Hamid, V. R. Balasaraswathi, Ludovic Journaux and M. Sugumaran, Vol. 20, No. 4, 2018, pp. 645-654 Article Full Text PDF |
||
| 7. | An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions
|
|
| Fadi Al-Ayed, Chunqiang Hu and Hang Liu, Vol. 20, No. 4, 2018, pp. 655-663 Article Full Text PDF |
||
| 8. | Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain
|
|
| Ming Yang, Rong Jiang, Tilei Gao, Wanyu Xie and Jia Wang, Vol. 20, No. 4, 2018, pp. 664-673 Article Full Text PDF |
||
| 9. | Study on Trust Model for Multi-users in Cloud Computing
|
|
| Xu Wu, Vol. 20, No. 4, 2018, pp. 674-682 Article Full Text PDF |
||
| 10. | Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
|
|
| Zhengjun Cao, Chong Mao, Lihua Liu, Wenping Kong, Jinbo Wang, Vol. 20, No. 4, 2018, pp. 683-688 Article Full Text PDF |
||
| 11. | CP-ABE for Selective Access with Scalable Revocation: A Case Study for Mobile-based Healthfolder
|
|
| Divyashikha Sethia, Huzur Saran, Daya Gupta, Vol. 20, No. 4, 2018, pp. 689-701 Article Full Text PDF |
||
| 12. | Data Verification Using Block Level Batch Auditing on Multi-cloud Server
|
|
| G. L. Prakash, Manish Prateek, and Inder Singh, Vol. 20, No. 4, 2018, pp. 702-709 Article Full Text PDF |
||
| 13. | A New Access Control System Based on CP-ABE in Named Data Networking
|
|
| Tao Feng, Jiaqi Guo, Vol. 20, No. 4, 2018, pp. 710-720 Article Full Text PDF |
||
| 14. | Defense Techniques of SYN Flood Attack Characterization and Comparisons
|
|
| Shaila Ghanti, G. M. Naik, Vol. 20, No. 4, 2018, pp. 721-729 Article Full Text PDF |
||
| 15. | Efficient Anomaly Intrusion Detection Using Hybrid Probabilistic Techniques in Wireless Ad Hoc Network
|
|
| K. Murugan and P. Suresh, Vol. 20, No. 4, 2018, pp. 730-737 Article Full Text PDF |
||
| 16. | Identification of Cyber Criminal by Analysing the Users Profile
|
|
| K. Veena and K. Meena, Vol. 20, No. 4, 2018, pp. 738-745 Article Full Text PDF |
||
| 17. | An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks
|
|
| V. S. Janani and M. S. K. Manikandan, Vol. 20, No. 4, 2018, pp. 746-753 Article Full Text PDF |
||
| 18. | A Credible Mechanism of Service about Data Resource in Cloud Computing
|
|
| Yunfa Li, Yangyang Shen and Mingyi Li, Vol. 20, No. 4, 2018, pp. 754-761 Article Full Text PDF |
||
| 19. | Traceable Certificateless Ring Signature Scheme For No Full Anonymous Applications
|
|
| Ke Gu, LinYu Wang, Na Wu and NianDong Liao, Vol. 20, No. 4, 2018, pp. 762-773 Article Full Text PDF |
||
| 20. | An Untraceable Voting Scheme Based on Pairs of Signatures
|
|
| Kazi Md. Rokibul Alam, Adnan Maruf, Md. Rezaur Rahman Rakib, G. G. Md. Nawaz Ali, Peter Han Joo Chong, and Yasuhiko Morimoto, Vol. 20, No. 4, 2018, pp. 774-787 Article Full Text PDF |
||
| 21. | Multiple New Formulas for Cipher Performance Computing
|
|
| Youssef Harmouch, Rachid Elkouch and Hussain Ben-Azza, Vol. 20, No. 4, 2018, pp. 788-800 Article Full Text PDF |
||
| 22. | A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching
|
|
| Yu-Lun Wang, Jau-Ji Shen, and Min-Shiang Hwang, Vol. 20, No. 4, 2018, pp. 801-804 Article Full Text PDF |
||
| 23. | Defense of Computer Network Viruses Based on Data Mining Technology
|
|
| Cen Zuo, Vol. 20, No. 4, 2018, pp. 805-810 Article Full Text PDF |
||
| 24. | Subject index to volume 20 (2018)
|
|
| Article Full Text PDF | ||
| 25. | Author index to volume 20 (2018)
|
|
| Article Full Text PDF | ||
| 26. | Reviewer index to volume 20 (2018)
|
|
| Article Full Text PDF | ||
| 27. | All Papers to volume 20 (2018)
|
|
| Article Full Text PDF | ||