Quick Search:

Paper Preview:

International Journal of Network Security

1. Uniform Resource Locator Based Steganography Methodology
Abdelrahman Desoky
Article Full Text PDF

2. Application of Artificial Intelligence Technology in Computer Network Security
Jialiang Zhang
Article Full Text PDF

3. Detection and Isolation of Wormholes in Mobile Ad-hoc Networks Using Localization Information
Govand Salih Kadir and Ihsan Alshahib Lami
Article Full Text PDF

4. 2-Adic Complexity of Sequences Generated by T-Functions
Yan Wang, Xueming Ren, Shunbo Li
Article Full Text PDF

5. Fully Secure Anonymous Identity Based Broadcast Encryption with Group of Prime Order
Yang Ming and Hongping Yuan
Article Full Text PDF

6. On The Secrecy Performance of Wireless Powered Device to Device Systems
Dinh-Thuan Do
Article Full Text PDF

7. An Image Encryption Scheme Based on The Three-dimensional Chaotic Logistic Map
Chunhu Li, Guangchun Luo, and Chunbao Li
Article Full Text PDF

8. Granger Causality in TCP Flooding Attack
Rup Kumar Deka, Dhruba Kumar Bhattacharyya, and Jugal Kumar Kalita
Article Full Text PDF

9. New Hierarchical Identity Based Encryption with maximum hierarchy
Dasari Kalyani and R. Sridevi
Article Full Text PDF

10. On The Security of a Certificateless Strong Designated Verifier Signature Scheme
Nasrollah Pakniat
Article Full Text PDF

11. Security Quantification Method for Intrusion Tolerance Systems Based on Multi-recovery
Jian-Hua Huang, Liang-Jie Chen, Fan-Chao Li and Ze Fang
Article Full Text PDF

12. Application of Video Watermarking Using Subdivision Technique to Enhance Information Security
Mahesh Gangarde, Janardhan Chitode and Shruti Oza
Article Full Text PDF

13. Secure Stored Images Using Transparent Crypto Filter Driver
Osama Ahmed Khashan, Nour Mahmoud Khafajah
Article Full Text PDF

14. Android Malware Identification through Visual Exploration of Disambly Files
Yongliang Zhao and Quan Qian
Article Full Text PDF

15. Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing
Hua Ma, Xiaoyu Han, Ting Peng and Linchao Zhang
Article Full Text PDF

16. Probabilistic Framework for Assessing the Threat Level using Novel Decision Constructs in Mobile Adhoc Network
V. Sangeetha and S. Swapna Kumar
Article Full Text PDF

17. A Review on DNA Based Cryptographic Techniques
Animesh Hazra, Soumya Ghosh, and Sampad Jash
Article Full Text PDF

18. A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map
Chunhu Li, Guangchun Luo, and Chunbao Li
Article Full Text PDF

19. ZBMRP: Zone Based MANET Routing Protocol with Genetic Algorithm and Security Enhancement Using Neural Network Learning
V. Preetha and K. Chitra
Article Full Text PDF

20. Formal Analysis of SDN Authentication Protocol with Mechanized Protocol Verifier in the Symbolic Model
Lili Yao, Jiabing Liu, Dejun Wang, Jing Li and Bo Meng
Article Full Text PDF

21. Multidimensional Data Aggregation Scheme For Smart Grid with Differential Privacy
Xiuxia Tian, Qian Song and Fuliang Tian
Article Full Text PDF

22. Secure Cloudlet-based eHealth Big Data System with Fine-Grained Access Control and Outsourcing Decryption from ABE
Kittur Philemon Kibiwott, Zhang Fengli, Omala A. Anyembe, Daniel Adu-Gyamfi
Article Full Text PDF

23. Image-based Multimodal Biometric Authentication Using Double Random Phase Encoding
Eman Tarek, Osama Ouda, and Ahmed Atwan
Article Full Text PDF

24. Privacy-Preserving and Dynamic Authentication Scheme for Smart Metering
Xiuxia Tian, Fuliang Tian, Anqin Zhang, and Xi Chen
Article Full Text PDF

25. An Improved AES S-box Based on Fibonacci Numbers and Prime Factor
Kamsiah Mohamed, Fakariah Hani Hj Mohd Ali, Suriyani Ariffin, Nur Hafiza Zakaria and Mohd Nazran Mohammed Pauzi
Article Full Text PDF

26. Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin
Lijuan Guo, Xuelian Li, and Juntao Gao
Article Full Text PDF

27. Medical Image Encryption Scheme Based on Multiple Chaos and DNA Coding
Joshua C. Dagadu, Jian-Ping Li, Emelia O. Aboagye, Faith K. Deynu
Article Full Text PDF

28. An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines
Ledi Fang, Shundong Li, and Wenli Wang
Article Full Text PDF

29. A Provable Secure Identity-based Generalized Proxy Signcryption Scheme
Caixue Zhou, Yue Zhang, and Lingmin Wang
Article Full Text PDF

30. Cryptanalysis of Two Strongly Unforgeable Identity-based Signatures in the Standard Model
Wenjie Yang, Min-Rong Chen, and Guo-Qiang Zeng
Article Full Text PDF

31. A High-efficiency Discrete Logarithm-based Multi-proxy Blind Signature Scheme via Elliptic Curve and Bilinear Mapping
Lin Teng and Hang Li
Article Full Text PDF

32. An Multi-step Attack Prediction Method Based on Probabilistic Reasoning Model
Guangming Tang, Shuo Wang, Guang Kou, Yuan Bian, Wenfeng Kang
Article Full Text PDF