Quick Search:

Paper Preview:

International Journal of Network Security

1. SPA Resistant Balanced Ternary Segmented Scalar Multiplication
Shuang-Gen Liu and Yuan-Yuan Ding
Article Full Text PDF

2. An Algorithm of the Privacy Security Protection Based on Location Service in the Internet of Vehicles
Peng-Shou Xie, Tian-Xia Fu, and Hong-Jin Fan
Article Full Text PDF

3. A PUF-based Group Key Transfer Protocol for Bluetooth
Sensen Li, Bin Yu, and Yicai Huang
Article Full Text PDF

4. AAVSS: Auxiliary Authorization Mechanism Based on Arbitrary-Angle VSS
Ying-Chin Chen, Kuo-Jui Wei, Jung-San Lee, Ngoc-Tu Huynh, and Jyun-Hong Lin
Article Full Text PDF

5. On the Security of a Certi cateless Proxy Signature Scheme in the Standard Model
Caixue Zhou, Xiwei Dong, Lihua Wang, and Tao Li
Article Full Text PDF

6. SPA Resistant Scalar Multiplication Using Pell Lucas Type Chain
Shuang-Gen Liu and Hui Zhao
Article Full Text PDF

7. Unidirectional FHPRE Scheme from Lattice for Cloud Computing
Juyan Li, Chunguang Ma, Lei Zhang, and Qi Yuan
Article Full Text PDF

8. A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network
Huaijin Liu, Yonghong Chen, Hui Tian, Tian Wang, and Yiqiao Cai
Article Full Text PDF

9. Managing Computer Security, Risk Analysis and Threat Using ISO 31000:2009: Case Study at Seiyun Community College, Yemen
Abdullah A. Al-khatib and Mohammed A. Hassan
Article Full Text PDF

10. Comment on ``Improved Secure RSA Cryptosystem (ISRSAC) for Data Confidentiality in Cloud''
Chenglian Liu and Chieh-Wen Hsu
Article Full Text PDF

11. A Dynamic ID Based Authenticated Group Key Agreement Protocol from Pairing
Shruti Nathani, B. P. Tripathi, Shaheena Khatoon
Article Full Text PDF

12. Design of an Anonymous Lightweight Communication Protocol for Smart Grid and Its Implementation on 8-bit AVR and 32-bit ARM
Dariush Abbasinezhad-Mood, Arezou Ostad-Sharif, and Morteza Nikooghadam
Article Full Text PDF

13. Network Security Situation Assessment Based on Text SimHash in Big Data Environment
Pengwen Lin and Yonghong Chen
Article Full Text PDF

14. Detection Algorithm for Sinkhole Attack in Body Area Sensor Networks Using Local Information
Adnan Nadeem and Turki Alghamdi
Article Full Text PDF

15. Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation
Shidong Zhang, Tongjiang Yan, Yuhua Sun, and Lianhai Wang
Article Full Text PDF

16. A Provably Secure Group Authentication Protocol for Various LTE Networks
Boriphat Kijjabuncha and Pipat Hiranvanichakorn
Article Full Text PDF

17. Probabilistic RSA with Homomorphism and Its Applications
Yaling Geng, Shundong Li, and Sufang Zhou
Article Full Text PDF

18. Subgroup Operations in Identity Based Encryption Using Weil Pairing for Decentralized Networks
N. Chaitanya Kumar, Abdul Basit, Priyadarshi Singh, and V. Ch. Venkaiah
Article Full Text PDF

19. Implementation, Performance and Security Analysis for CryptoBin Algorithm
Ahmed H. Eltengy, Samaa M. Shohieb, Ali E. Takieldeen, and Mohamed S. Ksasy
Article Full Text PDF

20. Security Analysis and Enhancements of A Remote User Authentication Scheme
Shou-Qi Cao, Qing Sun, and Li-Ling Cao
Article Full Text PDF

21. Augmented Hill Cipher
AbdAllah A. ElHabshy
Article Full Text PDF

22. Attribute Based Encryption with Efficient Revocation from Lattices
Kang Yang, Guohua Wu, Chengcheng Dong, Xingbing Fu, Fagen Li, Ting Wu
Article Full Text PDF

23. Quadrivium: A Trivium-Inspired Pseudorandom Number Generator
Latoya Jackson and Yesem Kurt Peker
Article Full Text PDF

24. Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey
Cossi Blaise Avoussoukpo, Chunxiang Xu, and Marius Tchenagnon
Article Full Text PDF

25. Reversible Data Hiding Scheme Based on Fully Exploiting The Orientation Combinations of Dual Stego-images
Xiaofeng Chen and Wenlong Guo
Article Full Text PDF

26. Novel and Secure Outsourcing Algorithms for Multiple Bilinear Pairings with Single Untrusted Server
Jiaxiang Yang, Yanping Li, and Yanli Ren
Article Full Text PDF

27. URLDeep: Continuous Prediction of Malicious URL with Dynamic Deep Learning in Social Networks
Putra Wanda and Huang Jin Jie
Article Full Text PDF

28. Correlation Functions of m-Sequences of Different Lengths
Zepeng Zhuo, Jinfeng Chong, and Lei Yu
Article Full Text PDF

29. Efficient Hierarchical Key Management Scheme for VR/AR Database Systems
Tsung-Chih Hsiao, Yu-Min Huang, Yu-Fang Chung, Tzer-Long Chen, and Tzer-Shyong Chen
Article Full Text PDF

30. An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain
Lei Meng, Shoulin Yin, Chu Zhao, Hang Li, and Yang Sun
Article Full Text PDF

31. A Novel SVD and LWT Based Robust Blind Audio Water-marking Scheme
Wenliang Wu
Article Full Text PDF

32. A Searchable CP-ABE Privacy Preserving Scheme
Tao Feng, Xiaoyu Yin, Ye Lu, Junli Fang, and Fenghua Li
Article Full Text PDF

33. Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security
Liyan Wang, Juntao Gao, and Xuelian Li
Article Full Text PDF

34. A Comprehensive Review of Pseudonym Changing Strategies in Vehicular Networks
Ikjot Sain, Sherif Saad, and Arunita Jaekel
Article Full Text PDF

35. A Novel Proxy Re-encryption Scheme Based on Identity Property and Stateless Broadcast Encryption Under Cloud Environment
Shoulin Yin, Hang Li, and Lin Teng
Article Full Text PDF

36. A New Chi-square Distribution De-noising Method for Image Encryption
Shoulin Yin, Hang Li, and Lin Teng
Article Full Text PDF