default search action
International Journal of Network Security, Volume 15
Volume 15, Number 1, January 2013
- Quan Qian, Chao-Jie Xiao, Rui Zhang:
Grid-based Data Stream Clustering for Intrusion Detection. 1-8 - Kakali Chatterjee, Asok De, Daya Gupta:
Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices. 9-15 - Quan Qian, Tianhong Wang, Rui Zhang:
Relative Network Entropy based Clustering Algorithm for Intrusion Detection. 16-22 - G. A. V. Rama Chandra Rao, P. V. Lakshmi, N. Ravi Shankar:
A New Modular Multiplication Method in Public Key Cryptosystem. 23-27 - Xiuxia Tian, Xiaoling Wang, Aoying Zhou:
DSP Re-encryption Based Access Control Enforcement Management Mechanism in DaaS. 28-41 - Benamar Kadri, Djilalli Moussaoui, Mohammed Feham:
A PKI over Ant Colony based Routing Algorithms for MANETs -AntPKI-. 42-49 - Mehran Asadi, Christopher Zimmerman, Afrand Agah:
A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks. 50-58 - Jianqin Zhou, Wei Xiong:
An Algorithm for Computing m-Tight Error Linear Complexity of Sequences over GF(p^m) with Period p^m. 59-63 - Cheng-Chi Lee, Chia-Hsin Liu, Min-Shiang Hwang:
Guessing Attacks on Strong-Password Authentication Protocol. 64-67 - Abdel Alim Kamal:
Cryptanalysis of a Polynomial-based Key Management Scheme for Secure Group Communication. 68-70
Volume 15, Number 2, March 2013
- Shih-Ting Hsu, Chou Chen Yang, Min-Shiang Hwang:
A Study of Public Key Encryption with Keyword Search. 71-79 - Heba Kamal Aslan, Ghada F. ElKabbany:
Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol. 80-96 - Mueen Uddin, Azizah Abdul Rahman, Naeem Uddin, Jamshed Memon, Raed A. Alsaqour, Suhail Kazi:
Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents. 97-105 - G. Manikandan, M. Kamarasan, N. Sairam:
A New Approach for Secure Data Transfer based on Wavelet Transform. 106-112 - Surekha Benguluri, G. N. Swamy:
Sensitive Digital Image Watermarking for Copyright Protection. 113-121 - Changsha Ma, Kaiping Xue, Peilin Hong:
A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks. 122-132 - Mingwu Zhang, Jintao Yao, Chunzhi Wang, Tsuyoshi Takagi:
Public Key Replacement and Universal Forgery of a SCLS Scheme. 133-138 - Chin-Chen Chang, Chia-Yin Lee:
A Smart Card-based Authentication Scheme Using User Identify Cryptography. 139-147 - Kitae Kim, Hyung-Don Kim, Seungho Kim, Ikkwon Yie:
Remarks on Zhang et al.'s Analysis on a Short Signature Scheme and Their Improvement. 148-150
Volume 15, Number 3, May 2013
- Sébastien Faye, Jean Frédéric Myoupo:
Secure and Energy-efficient Geocast Protocol for Wireless Sensor Networks based on a Hierarchical Clustered Structure. 151-160 - Qinyi Li, Hu Xiong, Fengli Zhang, Shengke Zeng:
An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext. 161-170 - Fangwei Wang, Yunkai Zhang, Honggang Guo, Changguang Wang:
Combating Good Point Set Scanning-based Self-learning Worms by Using Predators. 171-178 - Jeng-Ping Lin, Jih-Ming Fu:
Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party Setting. 179-189 - Mehdi Bateni, Ahmad Baraani, Ali A. Ghorbani:
Using Artificial Immune System and Fuzzy Logic for Alert Correlation. 190-204 - Qi Duan, Mohit Virendra:
On the Algorithms Related to Threshold Cryptography Based Network Protocols. 205-211 - Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang:
An Efficient Oblivious Transfer Protocol Using Residue Number System. 212-218 - Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta:
First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off. 219-230
Volume 15, Number 4, July 2013
- Cheng-Chi Lee, Pei-Shan Chung, Min-Shiang Hwang:
A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments. 231-240 - Ramasamy Murugan, Arumugam Shanmugam:
A Timer Based Acknowledgement Scheme for Node Misbehavior Detection and Isolation in MANET. 241-247 - Samir A. Elsagheer Mohamed:
Secure Position Verification Approach for Wireless Ad-hoc Networks. 248-255 - H. K. Pathak, Manju Sanghi:
Simple Three Party Key Exchange Protocol via Twin Diffie-Hellman Problem. 256-264 - R. Padmavathy, Chakravarthy Bhagvati:
Index Calculus Method based on Smooth Numbers of ±1 over Zp. 265-273 - Samaneh Mashhadi:
A Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers. 274-279 - Dulal Kar, Rashad Tatum, Keith Zejdlik:
MHIP: Effective Key Management for Mobile Heterogeneous Sensor Networks. 280-290 - Chang N. Zhang, Qian Yu, Xiao Wei Liu:
A Hybrid Fault Tolerant Approach for AES. 291-297 - Jaydeb Bhaumik, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Rain: Reversible Addition with Increased Nonlinearity. 298-306 - Lein Harn, Chin-Chen Chang, Hsiao-Ling Wu:
An Anonymous Multi-Receiver Encryption Based on RSA. 307-312 - Blazej Brzezniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Attack against Ibrahim's Distributed Key Generation for RSA. 313-316 - Hu Xiong, Jian-bin Hu, Zhong Chen:
Security Flaw of an ECC-based Signcryption Scheme with Anonymity. 317-320
Volume 15, Number 5, September 2013
- Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang:
A Study of Conjunctive Keyword Searchable Schemes. 321-330 - B. Sathish Babu, Jayashree N., Pallapa Venkataram:
Performance Analysis of Steiner Tree-based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks. 331-340 - Dhruti Sharma, Devesh Jinwala:
Key Generation Protocol in IBC. 341-349 - Debiao He, Weijing Zhao, Shuhua Wu:
Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards. 350-356 - Jayaprakash Kar:
ID-based Deniable Authentication Protocol based on Diffie-Hellman Problem on Elliptic Curve. 357-364 - P. D. Sheba Kezia Malarchelvi:
A Semi-Fragile Image Content Authentication Technique based on Secure Hash in Frequency Domain. 365-372 - Radhika Goel, Anjali Sardana, Ramesh C. Joshi:
Wireless Honeypot: Framework, Architectures and Tools. 373-383 - Haibo Tian, Xiaofeng Chen, Baodian Wei, Yi Liu:
Security Analysis of a Suite of Deniable Authentication Protocols. 384-389 - M. Uma, G. Padmavathi:
A Survey on Various Cyber Attacks and their Classification. 390-396 - Christos K. Dimitriadis:
Security for Mobile Operators in Practice. 397-404 - Jung-San Lee, Chin-Chen Chang, Kuo-Jui Wei:
Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy. 405-410
Volume 15, Number 6, November 2013
- Min-Yu Chen, Chou Chen Yang, Min-Shiang Hwang:
Privacy Protection Data Access Control. 411-419 - Günther Lackner:
A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX. 420-436 - Naila Shakeel, Ghulam Murtaza, Nassar Ikram:
MAYHAM - A New Hash Function. 437-445 - Hongbin Tang, Xinsong Liu, Lei Jiang:
A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance. 446-454 - Atanu Basu, Indranil Sengupta, Jamuna Kanta Sing:
Cryptosystem for Secret Sharing Scheme with Hierarchical Groups. 455-464 - Monjur Alam, Sonai Ray:
Design of an Intelligent SHA-1 Based Cryptographic System: A CPSO Based Approach. 465-470 - Chin-Chen Chang, Jen-Ho Yang:
A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies. 471-477 - Manjot Bhatia, Sunil Kumar Muttoo, Mahinder Pal Singh Bhatia:
Secure Requirement Prioritized Grid Scheduling Model. 478-483 - Huiyan Chen, Yong Li, Jinping Ren:
A Practical Identity-based Signcryption Scheme. 484-489 - Neeraj Kumar, Manoj Kumar, R. B. Patel:
A Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks. 490-500
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.