Quick Search:

Paper Preview:

International Journal of Network Security

1. 2-Adic Complexity of Sequences Generated by T-Functions
Yan Wang, Xueming Ren, Shunbo Li
Article Full Text PDF

2. Fully Secure Anonymous Identity Based Broadcast Encryption with Group of Prime Order
Yang Ming and Hongping Yuan
Article Full Text PDF

3. Granger Causality in TCP Flooding Attack
Rup Kumar Deka, Dhruba Kumar Bhattacharyya, and Jugal Kumar Kalita
Article Full Text PDF

4. Secure Stored Images Using Transparent Crypto Filter Driver
Osama Ahmed Khashan, Nour Mahmoud Khafajah
Article Full Text PDF

5. Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing
Hua Ma, Xiaoyu Han, Ting Peng and Linchao Zhang
Article Full Text PDF

6. Security Quantification Method for Intrusion Tolerance Systems Based on Multi-recovery
Jian-Hua Huang, Liang-Jie Chen, Fan-Chao Li and Ze Fang
Article Full Text PDF

7. Application of Video Watermarking Using Subdivision Technique to Enhance Information Security
Mahesh Gangarde, Janardhan Chitode and Shruti Oza
Article Full Text PDF

8. ZBMRP: Zone Based MANET Routing Protocol with Genetic Algorithm and Security Enhancement Using Neural Network Learning
V. Preetha and K. Chitra
Article Full Text PDF

9. Formal Analysis of SDN Authentication Protocol with Mechanized Protocol Verifier in the Symbolic Model
Lili Yao, Jiabing Liu, Dejun Wang, Jing Li and Bo Meng
Article Full Text PDF

10. Multidimensional Data Aggregation Scheme For Smart Grid with Differential Privacy
Xiuxia Tian, Qian Song and Fuliang Tian
Article Full Text PDF

11. Image-based Multimodal Biometric Authentication Using Double Random Phase Encoding
Eman Tarek, Osama Ouda, and Ahmed Atwan
Article Full Text PDF

12. Detection and Isolation of Wormholes in Mobile Ad-hoc Networks Using Localization Information
Govand Salih Kadir and Ihsan Alshahib Lami
Article Full Text PDF

13. Privacy-Preserving and Dynamic Authentication Scheme for Smart Metering
Xiuxia Tian, Fuliang Tian, Anqin Zhang, and Xi Chen
Article Full Text PDF

14. An Improved AES S-box Based on Fibonacci Numbers and Prime Factor
Kamsiah Mohamed, Fakariah Hani Hj Mohd Ali, Suriyani Ariffin, Nur Hafiza Zakaria and Mohd Nazran Mohammed Pauzi
Article Full Text PDF

15. Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin
Lijuan Guo, Xuelian Li, and Juntao Gao
Article Full Text PDF

16. Medical Image Encryption Scheme Based on Multiple Chaos and DNA Coding
Joshua C. Dagadu, Jian-Ping Li, Emelia O. Aboagye, Faith K. Deynu
Article Full Text PDF

17. An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines
Ledi Fang, Shundong Li, and Wenli Wang
Article Full Text PDF

18. Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust
Vegi Srinivas, Vatsavayi Valli Kumari, KVSVN Raju
Article Full Text PDF

19. An Multi-step Attack Prediction Method Based on Probabilistic Reasoning Model
Guangming Tang, Shuo Wang, Guang Kou, Yuan Bian, Wenfeng Kang
Article Full Text PDF