default search action
International Journal of Network Security, Volume 20
Volume 20, Number 1, January 2018
- Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang:
A Survey of Reversible Data Hiding for VQ-Compressed Images. 1-8 - M. Seshadri Srinath, Venkatachalam Chandrasekaran:
Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme. 9-18 - Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji:
New Protocol E-DNSSEC to Enhance DNSSEC Security. 19-24 - Mohamed el Boujnouni, Mohamed Jedra:
New Intrusion Detection System Based on Support Vector Domain Description with Information Gain Metric. 25-34 - Mikhail Styugin:
Establishing Systems Secure from Research with Implementation in Encryption Algorithms. 35-40 - Amrita, Kiran Kumar Ravulakollu:
A Hybrid Intrusion Detection System: Integrating Hybrid Feature Selection Approach with Heterogeneous Ensemble of Intelligent Classifiers. 41-55 - Amin Nezarat:
Distributed Intrusion Detection System Based on Mixed Cooperative and Non-Cooperative Game Theoretical Model. 56-64 - Jianjun Li, Yun-He Wu, Chin-Feng Lee, Chin-Chen Chang:
Generalized PVO-K Embedding Technique for Reversible Data Hiding. 65-77 - Rui Guo, Huixian Shi:
An Efficient Confidentiality Preserving Scheme Using Certificateless Encryption with High Trust Level. 78-87 - V. Padmavathi, B. Vishnu Vardhan, Addepalli V. N. Krishna:
Provably Secure Quantum Key Distribution By Applying Quantum Gate. 88-94 - Nyamsuren Vaanchig, Hu Xiong, Wei Chen, Zhiguang Qin:
Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation. 95-109 - Xiaodong Li, Cailan Zhou, Ning Xu:
A Secure and Efficient Image Encryption Algorithm Based on DNA Coding and Spatiotemporal Chaos. 110-120 - Yudha Purwanto, Kuspriyanto, Hendrawan, Budi Rahardjo:
Cost Analysis for Classification-based Autonomous Response Systems. 121-130 - Rui-Hong Dong, Dong-Fang Wu, Qiu-Yu Zhang, Hong-xiang Duan:
Mutual Information-based Intrusion Detection Model for Industrial Internet. 131-140 - Mostafa Behi, Mohammad GhasemiGol, Hamed Vahdat-Nejad:
A New Approach to Quantify Network Security by Ranking of Security Metrics and Considering Their Relationships. 141-148 - Rui Xie, Bi-yuan Jian, Daowei Liu:
An Improved Ownership Transfer for RFID Protocol. 149-156 - Hongzhuan Zhao, Dihua Sun, Hang Yue, Min Zhao, Senlin Cheng:
Dynamic Trust Model for Vehicular Cyber-Physical Systems. 157-167 - Leyou Zhang, Hongjian Yin:
Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption. 168-176 - Said Bouchkaren, Saiida Lazaar:
CAES Cryptosystem: Advanced Security Tests and Results. 177-183 - Helmi Md Rais, Tahir Mehmood:
Dynamic Ant Colony System with Three Level Update Feature Selection for Intrusion Detection. 184-192 - Dan Tang, Yaqiang Wang, Haopeng Yang:
Array Erasure Codes with Preset Fault Tolerance Capability. 193-200
Volume 20, Number 2, March 2018
- Cheng-Yi Tsai, Pi-Fang Ho, Min-Shiang Hwang:
A Secure Group Signature Scheme. 201-205 - Yi-Bo Huang, Qiu-Yu Zhang, Wen-Jin Hu:
Robust Speech Perception Hashing Authentication Algorithm Based on Spectral Subtraction and Multi-feature Tensor. 206-216 - Naresh Babu Muthu Mohan, Ardhani Sathya Narayana Chakravarthy, Cherukuri Ravindranath:
Cryptanalysis of Design and Analysis of a Provably Secure Multi-server Authentication Scheme. 217-224 - Debasish Das, Dhruba Kumar Bhattacharyya:
Defeating Cyber Attacks Due to Script Injection. 225-234 - Chunlin Jiang, Shi-lan Wu, Ke Gu:
New Kind of Delegation-based Anonymous Authentication Scheme for Wireless Roaming Networks. 235-242 - Kakali Chatterjee, Lalita Priya:
HKDS: A Hierarchical Key Distribution Scheme for Wireless Ad Hoc Network. 243-255 - Septafiansyah Dwi Putra, Ma'muri, Sarwono Sutikno, Yusuf Kurniawan, Adang Suwandi Ahmad:
Design of an AES Device as Device Under Test in a DPA Attack. 256-265 - Sujuan Li, Yi Mu, Mingwu Zhang:
Certificate-based Smooth Projective Hashing and Its Applications. 266-277 - Tzu-Chun Lin:
A Study of Non-Abelian Public Key. 278-290 - Shilpa Deshpande, Rajesh Ingle:
Evidence Based Trust Estimation Model for Cloud Computing Services. 291-303 - Sujatha Sivabalan, Peter J. Radcliffe:
Power Efficient Secure Web Servers. 304-312 - Hongfeng Zhu, Rui Wang:
A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography. 313-322 - Cheng Guo, Chin-Chen Chang, Shih-Chang Chang:
A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications. 323-331 - Jie Fang, Chenglian Liu:
A Generalize Estimating the Ø(n) of Upper-Lower Bound to RSA Public Key Crytosystem. 332-336 - Celia Li, Helen Cheung, Cungang Yang:
Secure and Efficient Authentication Protocol for Power System Computer Networks. 337-344 - Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang:
Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model. 345-358 - Rui-Hong Dong, Dong-Fang Wu, Qiu-Yu Zhang, Tao Zhang:
Traffic Characteristic Map-based Intrusion Detection Model for Industrial Internet. 359-370 - Mohamed Rasslan, Ghada F. El-Kabbany, Heba Kamal Aslan:
New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism. 371-380 - P. Kavitha, Rajeswari Mukesh:
Detection of Impersonation Attack in MANET Using Polynomial Reduction Algorithm. 381-389 - Xueqin Zhang, Baoping Wang, Wei Wang:
A New Remote Authentication Scheme for Anonymous Users Using Elliptic Curves Cryptosystem. 390-395 - Shin-Yan Chiou, Wen-Tsai Ko, Erl-Huei Lu:
A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application. 396-402
Volume 20, Number 3, May 2018
- Rena Ehmet, Lunzhi Deng, Yingying Zhang, Jiwen Zeng:
Multi-proxy Multi-signature without Pairing from Certificateless Cryptography. 403-413 - Debsmita Ghosh, Celia Li, Cungang Yang:
A Lightweight Authentication Protocol in Smart Grid. 414-422 - Prakash Annamalai, Krishnaveni Raju, Dhanalakshmi Ranganayakulu:
Soft Biometrics Traits for Continuous Authentication in Online Exam Using ICA Based Facial Recognition. 423-432 - Sujatha Sivabalan, Peter J. Radcliffe:
Feasibility of Eliminating IDPS Devices from a Web Server Farm. 433-438 - Qiuhua Wang, Hongxia Zhang, Qiuyun Lyu, Xiaojun Wang, Jianrong Bao:
A Novel Physical Channel Characteristics-based Channel Hopping Scheme for Jamming-resistant in Wireless Communication. 439-446 - Sreeja Cherillath Sukumaran, Mohammed Misbahuddin:
DNA Cryptography for Secure Data Storage in Cloud. 447-454 - Gitika Maity, Jaydeb Bhaumik, Anjan Kundu:
A New SPN Type Architecture to Strengthen Block Cipher Against Fault Attack. 455-462 - Hongfeng Zhu, Junlin Liu:
Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture. 463-471 - Gang Lu, Linyuan Xuan, Xuyun Nie, Zhiguang Qin, Bo Liu:
Cubic Medium Field Equation Public Key Cryptosystem. 472-477 - Chin-Chen Chang, Ngoc-Tu Huynh, Yu-Kai Wang, Yanjun Liu:
An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes. 478-488 - Ahmed A. Elngar:
IoT-based Efficient Tamper Detection Mechanism for Healthcare Application. 489-495 - Zhe Wei, Shuyan Yu:
Energy Aware and Trust Based Cluster Head Selection for Ad-hoc Sensor Networks. 496-501 - Lina Zou, Xueying Wang, Shoulin Yin:
A Data Sorting and Searching Scheme Based on Distributed Asymmetric Searchable Encryption. 502-508 - Gang Lu, Linyuan Xue, Xuyun Nie, Zhiguang Qin:
Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle. 509-514 - Ranjit Kumar Upadhyay, Sangeeta Kumari:
Global Stability of Worm Propagation Model with Nonlinear Incidence Rate in Computer Network. 515-526 - Harsha Putla, Chanakya Patibandla, China Venkaiah Vadlamudi:
A Reusable Multipartite Secret Sharing Scheme Based on Superincreasing Sequence. 527-535 - Xiaogang Wang, Weiren Shi:
Secure Time Synchronization Protocol for Wireless Sensor Network Based on µTESLA Protocol. 536-546 - Ramesh Singh Rawat, Emmanuel S. Pilli, Ramesh Chandra Joshi:
Survey of Peer-to-Peer Botnets and Detection Frameworks. 547-557 - Aaron Zimba, Hongsong Chen, Zhaoshun Wang:
Bayesian-Boolean Logic Security Assessment Model for Malware-Free Intrusions. 558-567 - Chandrashekhar Meshram, Sarita Gajbhiye Meshram, Cheng-Chi Lee:
Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle. 568-574 - Huiying Hou, Jia Yu, Rong Hao:
Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing. 575-584 - Mohammed Abdel-Azim, Hossam El-Din Salah, Menas Ebrahim Eissa:
IDS Against Black-Hole Attack for MANET. 585-592 - Cong Huang, Chao Wang:
Network Security Situation Awareness Based on the Optimized Dynamic Wavelet Neural Network. 593-600
Volume 20, Number 4, July 2018
- Arun Malik, Babita Pandey:
Security Analysis of Discrete Event Based Threat Driven Authentication Approach in VANET Using Petri Nets. 601-608 - Bei Xie, Jiaohua Qin, Xuyu Xiang, Hao Li, Lili Pan:
An Image Retrieval Algorithm Based on Gist and Sift Features. 609-616 - Chitra Rajarama, Jagadeesha Narasimhamurthy Sugatoor, T. Yerri Swamy:
Diffie-Hellman Type Key Exchange, ElGamal Like Encryption/Decryption and Proxy Re-encryption Using Circulant Matrices. 617-624 - Dindayal Mahto, Dilip Kumar Yadav:
Performance Analysis of RSA and Elliptic Curve Cryptography. 625-635 - Mourad Abdeljebbar, Rachid El Kouch:
Security Improvements of EPS-AKA Protocol. 636-644 - Yasir Hamid, Veeran Ranganathan Balasaraswathi, Ludovic Journaux, Muthukumarasamy Sugumaran:
Benchmark Datasets for Network Intrusion Detection: A Review. 645-654 - Fadi Al-Ayed, Chunqiang Hu, Hang Liu:
An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions. 655-663 - Ming Yang, Rong Jiang, Tilei Gao, Wanyu Xie, Jia Wang:
Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain. 664-673 - Xu Wu:
Study on Trust Model for Multi-users in Cloud Computing. 674-682 - Zhengjun Cao, Chong Mao, Lihua Liu, Wenping Kong, Jinbo Wang:
Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. 683-688 - Divyashikha Sethia, Huzur Saran, Daya Gupta:
CP-ABE for Selective Access with Scalable Revocation: A Case Study for Mobile-based Healthfolder. 689-701 - Prakash G. L, Manish Prateek, Inder Singh:
Data Verification Using Block Level Batch Auditing on Multi-cloud Server. 702-709 - Tao Feng, Jiaqi Guo:
A New Access Control System Based on CP-ABE in Named Data Networking. 710-720 - Shaila Ghanti, G. M. Naik:
Defense Techniques of SYN Flood Attack Characterization and Comparisons. 721-729 - K. Murugan, P. Suresh:
Efficient Anomaly Intrusion Detection Using Hybrid Probabilistic Techniques in Wireless Ad Hoc Network. 730-737 - K. Veena, K. Meena:
Identification of Cyber Criminal by Analysing the Users Profile. 738-745 - V. S. Janani, M. S. K. Manikandan:
An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks. 746-753 - Yunfa Li, Yangyang Shen, Mingyi Li:
A Credible Mechanism of Service about Data Resource in Cloud Computing. 754-761 - Ke Gu, LinYu Wang, Na Wu, NianDong Liao:
Traceable Certificateless Ring Signature Scheme For No Full Anonymous Applications. 762-773 - Kazi Md. Rokibul Alam, Adnan Maruf, Md. Rezaur Rahman Rakib, G. G. Md. Nawaz Ali, Peter Han Joo Chong, Yasuhiko Morimoto:
An Untraceable Voting Scheme Based on Pairs of Signatures. 774-787 - Youssef Harmouch, Rachid Elkouch, Hussain Ben-Azza:
Multiple New Formulas for Cipher Performance Computing. 788-800 - Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang:
A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching. 801-804 - Cen Zuo:
Defense of Computer Network Viruses Based on Data Mining Technology. 805-810
Volume 20, Number 5, September 2018
- Abdullah Abdulrahman Al-khatib, Rosilah Hassan:
Impact of IPSec Protocol on the Performance of Network Real-Time Applications: A Review. 811-819 - Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou:
Improving Network Intrusion Detection Using Geometric Mean LDA. 820-826 - Umesh Kumar Singh, Chanchala Joshi:
Scalable Approach Towards Discovery of Unknown Vulnerabilities. 827-835 - Ade Kurniawan, Imam Riadi:
Detection and Analysis Cerber Ransomware Using Network Forensics Behavior Based. 836-843 - KwangHyok Jo, Weimin Lei, Zhaozheng Li, Xiaoshi Song:
A Reversible Watermarking Algorithm in the Lossless Mode of HEVC. 844-852 - Travis Atkison, Stanislav Ponomarev, Randy K. Smith, Bernard Chen:
Feature Extraction Optimization for Network Intrusion Detection in Control System Networks. 853-861 - Yanhui Lv, Kexin Liu, Deyu Zhang, Zhuo Miao:
A Secure Routing Protocol Based on Reputation Mechanism. 862-871 - Lin Teng, Hang Li, Jie Liu, Shoulin Yin:
An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-Attribute Sorting Method. 872-878 - Shaoquan Jiang, Min Li, Zailiang Tang:
A New Scheme for Source-location Privacy in Wireless Sensor Networks. 879-889 - Raja Muthalagu, Subeen Jain:
Application of FSM Machine and S-Box in KASUMI Block Cipher to Improve Its Resistance Against Attack. 890-897 - Muawia A. Elsadig, Yahia A. Fadlalla:
An Efficient Approach to Resolve Covert Channels. 898-906 - Yanhua Wang, Yaqiu Liu, Kun Wang:
A Secure and Efficient Ciphertext Encryption Scheme Based on Attribute and Support Strategy Dynamic Update Via Hybrid Encryption. 907-913 - Lincy Elizebeth Jim, Mark A. Gregory:
A Grudger Based AIS Approach to Coerce Selfish Node Cooperation in MANET. 914-922 - Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu:
Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS. 923-930 - Shuang-Gen Liu, Xue-Jing Sun:
A Fast Scalar Multiplication Algorithm Based on Alternate-Zeckendorf Representation. 931-937 - Rui Xie, Jie Ling, Daowei Liu:
A Wireless Key Generation Algorithm for RFID System Based on Bit Operation. 938-950 - Vegi Srinivas, Vatsavayi Valli Kumari, K. V. S. V. N. Raju:
Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust. 951-959 - Xiaolong Xu, Zhonghe Gao, Lijuan Han:
An Efficient Compromised Nodes Detection System in Wireless Sensor Networks. 960-970 - Kazeem O. Okosun, Samson Ogunlade, Ebenezer Bonyah:
Optimal Control Analysis of Computer Virus Transmission. 971-982 - Li Lin:
A Detection and Defense Technology for Information-stealing and Deceitful Trojan Viruses Based on Behavioral Features. 983-987 - Samuel Jackson, Jeremy Straub, Scott Kerlin:
Exploring a Novel Cryptographic Solution for Securing Small Satellite Communications. 988-997 - Cheng-Yi Tsai, Cheng-Ying Yang, Iuon-Chang Lin, Min-Shiang Hwang:
A Survey of E-book Digital Right Management. 998-1004
Volume 20, Number 6, November 2018
- Abdelrahman Desoky:
Uniform Resource Locator Based Steganography Methodology. 1005-1015 - Jialiang Zhang:
Application of Artificial Intelligence Technology in Computer Network Security. 1016-1021 - Govand Salih Kadir, Ihsan Alshahib Lami:
Detection and Isolation of Wormholes in Mobile Ad-hoc Networks Using Localization Information. 1022-1032 - Jian-Hua Huang, Liang-Jie Chen, Fan-Chao Li, Ze Fang:
Security Quantification Method for Intrusion Tolerance Systems Based on Multi-recovery. 1033-1041 - Mahesh Gangarde, Janardhan Chitode, Shruti Oza:
Application of Video Watermarking Using Subdivision Technique to Enhance Information Security. 1042-1052 - Osama Ahmed Khashan, Nour Mahmoud Khafajah:
Secure Stored Images Using Transparent Crypto Filter Driver. 1053-1060 - Yongliang Zhao, Quan Qian:
Android Malware Identification Through Visual Exploration of Disambly Files. 1061-1073 - Hua Ma, Xiaoyu Han, Ting Peng, Linchao Zhang:
Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing. 1074-1084 - V. Sangeetha, S. Swapna Kumar:
Probabilistic Framework for Assessing the Threat Level using Novel Decision Constructs in Mobile Adhoc Network. 1085-1092 - Animesh Hazra, Soumya Ghosh, Sampad Jash:
A Review on DNA Based Cryptographic Techniques. 1093-1104 - Chunhu Li, Guangchun Luo, Chunbao Li:
A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map. 1105-1114 - V. Preetha, K. Chitra:
ZBMRP: Zone Based MANET Routing Protocol with Genetic Algorithm and Security Enhancement Using Neural Network Learning. 1115-1124 - Lili Yao, Jiabing Liu, Dejun Wang, Jing Li, Bo Meng:
Formal Analysis of SDN Authentication Protocol with Mechanized Protocol Verifier in the Symbolic Model. 1125-1136 - Xiuxia Tian, Qian Song, Fuliang Tian:
Multidimensional Data Aggregation Scheme For Smart Grid with Differential Privacy. 1137-1148 - Kittur P. Kibiwott, Fengli Zhang, Anyembe Andrew Omala, Daniel Adu-Gyamfi:
Secure Cloudlet-based eHealth Big Data System with Fine-Grained Access Control and Outsourcing Decryption from ABE. 1149-1162 - Eman Tarek, Osama Ouda, Ahmed Atwan:
Image-based Multimodal Biometric Authentication Using Double Random Phase Encoding. 1163-1174 - Ledi Fang, Shundong Li, Wenli Wang:
An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines. 1175-1182 - Caixue Zhou, Yue Zhang, Lingmin Wang:
A Provable Secure Identity-based Generalized Proxy Signcryption Scheme. 1183-1193 - Wenjie Yang, Min-Rong Chen, Guo-Qiang Zeng:
Cryptanalysis of Two Strongly Unforgeable Identity-based Signatures in the Standard Model. 1194-1199 - Lin Teng, Hang Li:
A High-efficiency Discrete Logarithm-based Multi-proxy Blind Signature Scheme via Elliptic Curve and Bilinear Mapping. 1200-1205 - Kamsiah Mohamed, Fakariah Hani Hj Mohd Ali, Suriyani Ariffin, Nur Hafiza Zakaria, Mohd Nazran Mohammed Pauzi:
An Improved AES S-box Based on Fibonacci Numbers and Prime Factor. 1206-1214 - Yun Zhang:
Research on the Security Protection of E-Commerce Information under the Background of Mobile Consumption. 1215-1220 - Li-Chin Huang, Ting-Yi Chang, Min-Shiang Hwang:
A Conference Key Scheme Based on the Diffie-Hellman Key Exchange. 1221-1226 - Lei Zhang:
Supervision and Investigation of Internet Fraud Crimes. 1227-1233
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.