Quick Search:

Volume: 21, No: 2 (March 1, 2019)

International Journal of Network Security

1. Provably Secure Searchable Attribute-Based Authenticated Encryption Scheme
Zhenhua Liu and Yaqing Fan, Vol. 21, No. 2, 2019, pp. 177-190
Article Full Text PDF

2. A Robust Authentication Protocol for Multi-server Architecture Using Elliptic Curve Cryptography
Xueqin Zhang, Baoping Wang, and Wenpeng Zhang, Vol. 21, No. 2, 2019, pp. 191-198
Article Full Text PDF

3. A Secure Privacy-Preserving Cloud Auditing Scheme with Data Deduplication
Chen Li and Zhenhua Liu, Vol. 21, No. 2, 2019, pp. 199-210
Article Full Text PDF

4. A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing
Yanjun Liu and Chin-Chen Chang, Vol. 21, No. 2, 2019, pp. 211-220
Article Full Text PDF

5. Privacy Preserving and Public Auditable Integrity Checking on Dynamic Cloud Data
Surmila Thokchom and Dilip Kr. Saikia, Vol. 21, No. 2, 2019, pp. 221-229
Article Full Text PDF

6. On Security Improvement of Adaptive Pixel Pair Matching with Modified Searching Mechanism
Wien Hong, Shuozhen Zheng, and Xiaoyu Zhou, Vol. 21, No. 2, 2019, pp. 230-235
Article Full Text PDF

7. Secure Multiple-Antenna Ultrawideband System: A Wireless Physical-Layer Security Perspective
Tanit Somleewong and Kiattisak Maichalernnukul, Vol. 21, No. 2, 2019, pp. 236-242
Article Full Text PDF

8. A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network
Huaijin Liu, Yonghong Chen, Hui Tian, and Tian Wang, Vol. 21, No. 2, 2019, pp. 243-249
Article Full Text PDF

9. Construction and Analysis of Key Generation Algorithms Based on Modified Fibonacci and Scrambling Factors for Privacy Preservation
Amiruddin Amiruddin, Anak Agung Putri Ratna, and Riri Fitri Sari, Vol. 21, No. 2, 2019, pp. 250-258
Article Full Text PDF

10. Spectrogram-based Efficient Perceptual Hashing Scheme for Speech Identification
Qiu-Yu Zhang, Tao Zhang, Si-Bin Qiao, and Dong-Fang Wu, Vol. 21, No. 2, 2019, pp. 259-268
Article Full Text PDF

11. A Note on the Construction of Lightweight Cyclic MDS Matrices
Akbar Mahmoodi Rishakani, Yousef Fekri Dabanloo, Seyed Mojtaba Dehnavi, Mohammad Reza Mirzaee Shamsabad, Nasour Bagheri, Vol. 21, No. 2, 2019, pp. 269-274
Article Full Text PDF

12. Exploiting Incremental Classifiers for the Training of an Adaptive Intrusion Detection Model
Marwa R. Mohamed, Abdurrahman A. Nasr, I. F. Tarrad and Salah R. Abdulmageed, Vol. 21, No. 2, 2019, pp. 275-289
Article Full Text PDF

13. Tight Proofs of Identity-based Signatures without Random Oracle
Huiyan Chen, Yanshuo Zhang, Zongjie Wan, Chenchen Zhang, Vol. 21, No. 2, 2019, pp. 290-297
Article Full Text PDF

14. Cryptanalysis of an ID-based Deniable Threshold Ring Authentication
Tzu-Chun Lin, Ting-Yi Yeh, Min-Shiang Hwang, Vol. 21, No. 2, 2019, pp. 298-302
Article Full Text PDF

15. On Multi-user based Efficient Computation Outsourcing Scheme and its Application to Cloud
V. Sudarsan Rao and N. Satyanarayana, Vol. 21, No. 2, 2019, pp. 303-311
Article Full Text PDF

16. Privacy Preservation for eHealth Big Data in Cloud Accessed Using Resource-Constrained Devices: Survey.
Kittur Philemon Kibiwott, Zhang Fengli, Kimeli Victor K., Omala A. Anyembe, Eugene Opoku-Mensah, Vol. 21, No. 2, 2019, pp. 312-325
Article Full Text PDF

17. Achieving an Effective, Confidentiality and Integrity of Data in Cloud Computing
Ghassan Sabeeh Mahmood, Dong Jun Huang, Baidaa Abdulrahman Jaleel, Vol. 21, No. 2, 2019, pp. 326-332
Article Full Text PDF

18. AODVDC: An Improved Protocol Prevents Whirlwind Attacks in Mobile Ad hoc Network
Luong Thai Ngoc and Vo Thanh Tu, Vol. 21, No. 2, 2019, pp. 333-341
Article Full Text PDF

19. Comprehgensive Security for Body Area Networks: A Survey
Laura Victoria Morales, David Delgado-Ruiz, and Sandra Julieta Rueda, Vol. 21, No. 2, 2019, pp. 342-354
Article Full Text PDF

20. Comments on Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting
Qingfeng Cheng and Xinglong Zhang, Vol. 21, No. 2, 2019, pp. 355-358
Article Full Text PDF

21. Subject index to volume 21 (2019)
Article Full Text PDF

22. Author index to volume 21 (2019)
Article Full Text PDF

23. Reviewer index to volume 21 (2019)
Article Full Text PDF

24. All Papers to volume 21 (2019)
Article Full Text PDF