default search action
International Journal of Network Security, Volume 14
Volume 14, Number 1, January 2012
- Ashok Kumar Das:
Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks. 1-21 - Samaneh Mashhadi:
A Novel Secure Self Proxy Signature Scheme. 22-26 - Addepalli V. N. Krishna:
A New Non Linear Model Based Encryption Mechanism with Time Stamp and Acknowledgement Support. 27-32 - Zhiwei Wang, Licheng Wang, Shihui Zheng, Yixian Yang, Zhengming Hu:
Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues. 33-38 - Sandeep K. Sood:
An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol. 39-46 - Mustapha Hedabou:
Efficient Countermeasure for Securing the Eta Pairing Computation over Binary Fields. 47-52 - Shuhua Wu, Qiong Pu:
Comments on a Buyer-Seller Watermarking Protocol for Large Scale Networks. 53-58 - Martin Stanek:
A Note on Security Protocol for Multicast Communications. 59-60
Volume 14, Number 2, March 2012
- Brij B. Gupta, Ramesh C. Joshi, Manoj Misra:
ANN Based Scheme to Predict Number of Zombies in a DDoS Attack. 61-70 - Behzad Malek, Ali Miri:
Adaptively Secure Broadcast Encryption with Short Ciphertexts. 71-79 - Navaneet Ojha, Sahadeo Padhye:
Weak Keys in RSA over The Work of Blomer & May. 80-85 - Feng Zhu, Matt W. Mutka, Lionel M. Ni:
Private Entity Authentication for Pervasive Computing Environments. 86-100 - Saikat Basu:
A New Parallel Window-Based Implementation of the Elliptic Curve Point Multiplication in Multi-Core Architectures. 101-108 - Ping Dong, Huanyan Qian, Zhongjun Lu, Shaohua Lan:
A Network Covert Channel Based on Packet Classification. 109-116 - Razi Arshad, Nassar Ikram:
Cryptanalysis of a Non-interactive Deniable Authentication Protocol Based on Factoring. 117-120
Volume 14, Number 3, May 2012
- Kavitha Ammayappan, V. N. Sastry, Atul Negi:
A New Secure Route Discovery Protocol for MANETs to Prevent Hidden Channel Attacks. 121-141 - Youliang Tian, Changgen Peng, Jianfeng Ma:
Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings. 142-148 - Bimal Kumar Mishra, Gholam Mursalin Ansari:
Differential Epidemic Model of Virus and Worms in Computer Network. 149-155 - Li Yang, Jianfeng Ma, Qi Jiang:
Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing. 156-163 - Kalpana Singh, Shefalika Ghosh Samaddar:
Enhancing Koyama Scheme Using Selective Encryption Technique in RSA-based Singular Cubic Curve with AVK. 164-172 - Rajaram Ramasamy, Amutha Prabakar Muniyandi:
An Efficient Password Authentication Scheme for Smart Card. 180-186
Volume 14, Number 4, July 2012
- Arun Velagapalli, Mahalingam Ramkumar:
Trustworthy TCB for DNS Servers. 187-205 - Behzad Malek, Ali Miri:
Securing Harari's Authentication Scheme. 206-210 - Radhika Goel, Anjali Sardana, Ramesh C. Joshi:
Parallel Misuse and Anomaly Detection Model. 211-222 - S. S. Sujatha, M. Mohamed Sathik:
A Novel DWT Based Blind Watermarking for Image Authentication. 223-228 - Tzu-Chang Yeh, Jian-Ren Peng, Sheng-Shih Wang, Jun-Ping Hsu:
Securing Bluetooth Communications. 229-235 - S. Maria Celestin Vigila, K. Muneeswaran:
Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications. 236-242
Volume 14, Number 5, September 2012
- I-Wei Chen, Po-Ching Lin, Tsung-Huan Cheng, Chi-Chung Luo, Ying-Dar Lin, Yuan-Cheng Lai, Frank C. Lin:
Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems. 243-250 - Xingwen Zhao:
Amendment to Trace and Revoke Systems with Short Ciphertexts. 251-256 - N. Jeyanthi, N. Ch. Sriman Narayana Iyengar:
An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks. 257-269 - Zhenhua Chen, Shundong Li, Chunzhi Wang, Yanping Shen:
Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy. 270-279 - Ayman Mousa, Elsayed Nigm, El-Sayed El-Rabaie, Osama S. Faragallah:
Query Processing Performance on Encrypted Databases by Using the REA Algorithm. 280-288 - Ashraf El-Sisi, Hamdy M. Mousa:
Evaluation of Encryption Algorithms for Privacy Preserving Association Rules Mining. 289-296 - Jian-bin Hu, Hu Xiong, Zhong Chen:
Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications. 297-300
Volume 14, Number 6, November 2012
- Li-Chin Huang, Lin-Yu Tseng, Min-Shiang Hwang:
The Study of Data Hiding in Medical Images. 301-309 - Miaomiao Tian, Liusheng Huang, Wei Yang:
A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model. 310-315 - Kalyan Chakraborty, Jay Mehta:
A Stamped Blind Signature Scheme based on Elliptic Curve Discrete Logarithm Problem. 316-319 - Miaomiao Tian, Liusheng Huang:
Breaking A Proxy Signature Scheme From Lattices. 320-323 - Mishari Al Mishari, Emiliano De Cristofaro, Karim M. El Defrawy, Gene Tsudik:
Harvesting SSL Certificate Data to Identify Web-Fraud. 324-338 - Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita:
AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach. 339-351 - Farzaneh Geramiraz, Amir Saman Memaripour, Maghsoud Abbaspour:
Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller. 352-361 - Miaomiao Tian, Wei Yang, Liusheng Huang:
Security of a Biometric Identity-based Encryption Scheme. 362-365
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.