International Journal of Network Security | ||
1. | Provably Secure Searchable Attribute-Based Authenticated Encryption Scheme
|
|
Zhenhua Liu and Yaqing Fan, Vol. 21, No. 2, 2019, pp. 177-190 Article Full Text PDF |
||
2. | A Robust Authentication Protocol for Multi-server Architecture Using Elliptic Curve Cryptography
|
|
Xueqin Zhang, Baoping Wang, and Wenpeng Zhang, Vol. 21, No. 2, 2019, pp. 191-198 Article Full Text PDF |
||
3. | A Secure Privacy-Preserving Cloud Auditing Scheme with Data Deduplication
|
|
Chen Li and Zhenhua Liu, Vol. 21, No. 2, 2019, pp. 199-210 Article Full Text PDF |
||
4. | A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing
|
|
Yanjun Liu and Chin-Chen Chang, Vol. 21, No. 2, 2019, pp. 211-220 Article Full Text PDF |
||
5. | Privacy Preserving and Public Auditable Integrity Checking on Dynamic Cloud Data
|
|
Surmila Thokchom and Dilip Kr. Saikia, Vol. 21, No. 2, 2019, pp. 221-229 Article Full Text PDF |
||
6. | On Security Improvement of Adaptive Pixel Pair Matching with Modified Searching Mechanism
|
|
Wien Hong, Shuozhen Zheng, and Xiaoyu Zhou, Vol. 21, No. 2, 2019, pp. 230-235 Article Full Text PDF |
||
7. | Secure Multiple-Antenna Ultrawideband System: A Wireless Physical-Layer Security Perspective
|
|
Tanit Somleewong and Kiattisak Maichalernnukul, Vol. 21, No. 2, 2019, pp. 236-242 Article Full Text PDF |
||
8. | A Security and Efficient Data Aggregation Scheme for Cloud-Assisted Wireless Body Area Network
|
|
Huaijin Liu, Yonghong Chen, Hui Tian, and Tian Wang, Vol. 21, No. 2, 2019, pp. 243-249 Article Full Text PDF |
||
9. | Construction and Analysis of Key Generation Algorithms Based on Modified Fibonacci and Scrambling Factors for Privacy Preservation
|
|
Amiruddin Amiruddin, Anak Agung Putri Ratna, and Riri Fitri Sari, Vol. 21, No. 2, 2019, pp. 250-258 Article Full Text PDF |
||
10. | Spectrogram-based Efficient Perceptual Hashing Scheme for Speech Identification
|
|
Qiu-Yu Zhang, Tao Zhang, Si-Bin Qiao, and Dong-Fang Wu, Vol. 21, No. 2, 2019, pp. 259-268 Article Full Text PDF |
||
11. | A Note on the Construction of Lightweight Cyclic MDS Matrices
|
|
Akbar Mahmoodi Rishakani, Yousef Fekri Dabanloo, Seyed Mojtaba Dehnavi, Mohammad Reza Mirzaee Shamsabad, Nasour Bagheri, Vol. 21, No. 2, 2019, pp. 269-274 Article Full Text PDF |
||
12. | Exploiting Incremental Classifiers for the Training of an Adaptive Intrusion Detection Model
|
|
Marwa R. Mohamed, Abdurrahman A. Nasr, I. F. Tarrad and Salah R. Abdulmageed, Vol. 21, No. 2, 2019, pp. 275-289 Article Full Text PDF |
||
13. | Tight Proofs of Identity-based Signatures without Random Oracle
|
|
Huiyan Chen, Yanshuo Zhang, Zongjie Wan, Chenchen Zhang, Vol. 21, No. 2, 2019, pp. 290-297 Article Full Text PDF |
||
14. | Cryptanalysis of an ID-based Deniable Threshold Ring Authentication
|
|
Tzu-Chun Lin, Ting-Yi Yeh, Min-Shiang Hwang, Vol. 21, No. 2, 2019, pp. 298-302 Article Full Text PDF |
||
15. | On Multi-user based Efficient Computation Outsourcing Scheme and its Application to Cloud
|
|
V. Sudarsan Rao and N. Satyanarayana, Vol. 21, No. 2, 2019, pp. 303-311 Article Full Text PDF |
||
16. | Privacy Preservation for eHealth Big Data in Cloud Accessed Using Resource-Constrained Devices: Survey.
|
|
Kittur Philemon Kibiwott, Zhang Fengli, Kimeli Victor K., Omala A. Anyembe, Eugene Opoku-Mensah, Vol. 21, No. 2, 2019, pp. 312-325 Article Full Text PDF |
||
17. | Achieving an Effective, Confidentiality and Integrity of Data in Cloud Computing
|
|
Ghassan Sabeeh Mahmood, Dong Jun Huang, Baidaa Abdulrahman Jaleel, Vol. 21, No. 2, 2019, pp. 326-332 Article Full Text PDF |
||
18. | AODVDC: An Improved Protocol Prevents Whirlwind Attacks in Mobile Ad hoc Network
|
|
Luong Thai Ngoc and Vo Thanh Tu, Vol. 21, No. 2, 2019, pp. 333-341 Article Full Text PDF |
||
19. | Comprehgensive Security for Body Area Networks: A Survey
|
|
Laura Victoria Morales, David Delgado-Ruiz, and Sandra Julieta Rueda, Vol. 21, No. 2, 2019, pp. 342-354 Article Full Text PDF |
||
20. | Comments on Privacy-Preserving Yoking Proof with Key Exchange in the Three-Party Setting
|
|
Qingfeng Cheng and Xinglong Zhang, Vol. 21, No. 2, 2019, pp. 355-358 Article Full Text PDF |
||
21. | Subject index to volume 21 (2019)
|
|
Article Full Text PDF | ||
22. | Author index to volume 21 (2019)
|
|
Article Full Text PDF | ||
23. | Reviewer index to volume 21 (2019)
|
|
Article Full Text PDF | ||
24. | All Papers to volume 21 (2019)
|
|
Article Full Text PDF | ||