


default search action
International Journal of Network Security, Volume 20
Volume 20, Number 1, January 2018
- Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang:

A Survey of Reversible Data Hiding for VQ-Compressed Images. 1-8 - M. Seshadri Srinath, Venkatachalam Chandrasekaran:

Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme. 9-18 - Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji:

New Protocol E-DNSSEC to Enhance DNSSEC Security. 19-24 - Mohamed el Boujnouni, Mohamed Jedra:

New Intrusion Detection System Based on Support Vector Domain Description with Information Gain Metric. 25-34 - Mikhail Styugin:

Establishing Systems Secure from Research with Implementation in Encryption Algorithms. 35-40 - Amrita, Kiran Kumar Ravulakollu:

A Hybrid Intrusion Detection System: Integrating Hybrid Feature Selection Approach with Heterogeneous Ensemble of Intelligent Classifiers. 41-55 - Amin Nezarat:

Distributed Intrusion Detection System Based on Mixed Cooperative and Non-Cooperative Game Theoretical Model. 56-64 - Jianjun Li, Yun-He Wu, Chin-Feng Lee, Chin-Chen Chang:

Generalized PVO-K Embedding Technique for Reversible Data Hiding. 65-77 - Rui Guo, Huixian Shi:

An Efficient Confidentiality Preserving Scheme Using Certificateless Encryption with High Trust Level. 78-87 - V. Padmavathi, B. Vishnu Vardhan, Addepalli V. N. Krishna:

Provably Secure Quantum Key Distribution By Applying Quantum Gate. 88-94 - Nyamsuren Vaanchig, Hu Xiong, Wei Chen, Zhiguang Qin:

Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation. 95-109 - Xiaodong Li, Cailan Zhou, Ning Xu:

A Secure and Efficient Image Encryption Algorithm Based on DNA Coding and Spatiotemporal Chaos. 110-120 - Yudha Purwanto, Kuspriyanto, Hendrawan, Budi Rahardjo:

Cost Analysis for Classification-based Autonomous Response Systems. 121-130 - Rui-Hong Dong, Dong-Fang Wu

, Qiu-Yu Zhang, Hong-xiang Duan:
Mutual Information-based Intrusion Detection Model for Industrial Internet. 131-140 - Mostafa Behi, Mohammad GhasemiGol, Hamed Vahdat-Nejad:

A New Approach to Quantify Network Security by Ranking of Security Metrics and Considering Their Relationships. 141-148 - Rui Xie, Bi-yuan Jian, Daowei Liu:

An Improved Ownership Transfer for RFID Protocol. 149-156 - Hongzhuan Zhao, Dihua Sun, Hang Yue, Min Zhao, Senlin Cheng:

Dynamic Trust Model for Vehicular Cyber-Physical Systems. 157-167 - Leyou Zhang, Hongjian Yin:

Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption. 168-176 - Said Bouchkaren, Saiida Lazaar:

CAES Cryptosystem: Advanced Security Tests and Results. 177-183 - Helmi Md Rais, Tahir Mehmood:

Dynamic Ant Colony System with Three Level Update Feature Selection for Intrusion Detection. 184-192 - Dan Tang, Yaqiang Wang, Haopeng Yang

:
Array Erasure Codes with Preset Fault Tolerance Capability. 193-200
Volume 20, Number 2, March 2018
- Cheng-Yi Tsai, Pi-Fang Ho, Min-Shiang Hwang:

A Secure Group Signature Scheme. 201-205 - Yi-Bo Huang, Qiu-Yu Zhang, Wen-Jin Hu:

Robust Speech Perception Hashing Authentication Algorithm Based on Spectral Subtraction and Multi-feature Tensor. 206-216 - Naresh Babu Muthu Mohan, Ardhani Sathya Narayana Chakravarthy, Cherukuri Ravindranath:

Cryptanalysis of Design and Analysis of a Provably Secure Multi-server Authentication Scheme. 217-224 - Debasish Das, Dhruba Kumar Bhattacharyya:

Defeating Cyber Attacks Due to Script Injection. 225-234 - Chunlin Jiang, Shi-lan Wu, Ke Gu:

New Kind of Delegation-based Anonymous Authentication Scheme for Wireless Roaming Networks. 235-242 - Kakali Chatterjee, Lalita Priya:

HKDS: A Hierarchical Key Distribution Scheme for Wireless Ad Hoc Network. 243-255 - Septafiansyah Dwi Putra, Ma'muri, Sarwono Sutikno, Yusuf Kurniawan, Adang Suwandi Ahmad:

Design of an AES Device as Device Under Test in a DPA Attack. 256-265 - Sujuan Li, Yi Mu, Mingwu Zhang:

Certificate-based Smooth Projective Hashing and Its Applications. 266-277 - Tzu-Chun Lin:

A Study of Non-Abelian Public Key. 278-290 - Shilpa Deshpande, Rajesh Ingle:

Evidence Based Trust Estimation Model for Cloud Computing Services. 291-303 - Sujatha Sivabalan, Peter J. Radcliffe:

Power Efficient Secure Web Servers. 304-312 - Hongfeng Zhu, Rui Wang:

A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography. 313-322 - Cheng Guo, Chin-Chen Chang, Shih-Chang Chang:

A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications. 323-331 - Jie Fang, Chenglian Liu:

A Generalize Estimating the Ø(n) of Upper-Lower Bound to RSA Public Key Crytosystem. 332-336 - Celia Li, Helen Cheung, Cungang Yang:

Secure and Efficient Authentication Protocol for Power System Computer Networks. 337-344 - Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang:

Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model. 345-358 - Rui-Hong Dong, Dong-Fang Wu

, Qiu-Yu Zhang, Tao Zhang:
Traffic Characteristic Map-based Intrusion Detection Model for Industrial Internet. 359-370 - Mohamed Rasslan, Ghada F. El-Kabbany, Heba Kamal Aslan:

New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism. 371-380 - P. Kavitha, Rajeswari Mukesh:

Detection of Impersonation Attack in MANET Using Polynomial Reduction Algorithm. 381-389 - Xueqin Zhang, Baoping Wang, Wei Wang:

A New Remote Authentication Scheme for Anonymous Users Using Elliptic Curves Cryptosystem. 390-395 - Shin-Yan Chiou, Wen-Tsai Ko, Erl-Huei Lu:

A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application. 396-402
Volume 20, Number 3, May 2018
- Rena Ehmet, Lunzhi Deng, Yingying Zhang, Jiwen Zeng:

Multi-proxy Multi-signature without Pairing from Certificateless Cryptography. 403-413 - Debsmita Ghosh, Celia Li, Cungang Yang:

A Lightweight Authentication Protocol in Smart Grid. 414-422 - Prakash Annamalai, Krishnaveni Raju, Dhanalakshmi Ranganayakulu:

Soft Biometrics Traits for Continuous Authentication in Online Exam Using ICA Based Facial Recognition. 423-432 - Sujatha Sivabalan, Peter J. Radcliffe:

Feasibility of Eliminating IDPS Devices from a Web Server Farm. 433-438 - Qiuhua Wang, Hongxia Zhang, Qiuyun Lyu, Xiaojun Wang, Jianrong Bao:

A Novel Physical Channel Characteristics-based Channel Hopping Scheme for Jamming-resistant in Wireless Communication. 439-446 - Sreeja Cherillath Sukumaran, Mohammed Misbahuddin:

DNA Cryptography for Secure Data Storage in Cloud. 447-454 - Gitika Maity, Jaydeb Bhaumik, Anjan Kundu:

A New SPN Type Architecture to Strengthen Block Cipher Against Fault Attack. 455-462 - Hongfeng Zhu, Junlin Liu:

Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture. 463-471 - Gang Lu, Linyuan Xuan, Xuyun Nie, Zhiguang Qin, Bo Liu:

Cubic Medium Field Equation Public Key Cryptosystem. 472-477 - Chin-Chen Chang, Ngoc-Tu Huynh, Yu-Kai Wang, Yanjun Liu:

An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes. 478-488 - Ahmed A. Elngar:

IoT-based Efficient Tamper Detection Mechanism for Healthcare Application. 489-495 - Zhe Wei, Shuyan Yu:

Energy Aware and Trust Based Cluster Head Selection for Ad-hoc Sensor Networks. 496-501 - Lina Zou, Xueying Wang, Shoulin Yin:

A Data Sorting and Searching Scheme Based on Distributed Asymmetric Searchable Encryption. 502-508 - Gang Lu, Linyuan Xue, Xuyun Nie, Zhiguang Qin:

Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle. 509-514 - Ranjit Kumar Upadhyay, Sangeeta Kumari:

Global Stability of Worm Propagation Model with Nonlinear Incidence Rate in Computer Network. 515-526 - Harsha Putla, Chanakya Patibandla, China Venkaiah Vadlamudi:

A Reusable Multipartite Secret Sharing Scheme Based on Superincreasing Sequence. 527-535 - Xiaogang Wang, Weiren Shi:

Secure Time Synchronization Protocol for Wireless Sensor Network Based on µTESLA Protocol. 536-546 - Ramesh Singh Rawat, Emmanuel S. Pilli, Ramesh Chandra Joshi:

Survey of Peer-to-Peer Botnets and Detection Frameworks. 547-557 - Aaron Zimba, Hongsong Chen, Zhaoshun Wang:

Bayesian-Boolean Logic Security Assessment Model for Malware-Free Intrusions. 558-567 - Chandrashekhar Meshram, Sarita Gajbhiye Meshram, Cheng-Chi Lee:

Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle. 568-574 - Huiying Hou, Jia Yu, Rong Hao:

Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing. 575-584 - Mohammed Abdel-Azim, Hossam El-Din Salah, Menas Ebrahim Eissa:

IDS Against Black-Hole Attack for MANET. 585-592 - Cong Huang, Chao Wang:

Network Security Situation Awareness Based on the Optimized Dynamic Wavelet Neural Network. 593-600
Volume 20, Number 4, July 2018
- Arun Malik, Babita Pandey:

Security Analysis of Discrete Event Based Threat Driven Authentication Approach in VANET Using Petri Nets. 601-608 - Bei Xie, Jiaohua Qin, Xuyu Xiang, Hao Li, Lili Pan:

An Image Retrieval Algorithm Based on Gist and Sift Features. 609-616 - Chitra Rajarama, Jagadeesha Narasimhamurthy Sugatoor, T. Yerri Swamy:

Diffie-Hellman Type Key Exchange, ElGamal Like Encryption/Decryption and Proxy Re-encryption Using Circulant Matrices. 617-624 - Dindayal Mahto, Dilip Kumar Yadav:

Performance Analysis of RSA and Elliptic Curve Cryptography. 625-635 - Mourad Abdeljebbar, Rachid El Kouch:

Security Improvements of EPS-AKA Protocol. 636-644 - Yasir Hamid, Veeran Ranganathan Balasaraswathi, Ludovic Journaux, Muthukumarasamy Sugumaran:

Benchmark Datasets for Network Intrusion Detection: A Review. 645-654 - Fadi Al-Ayed, Chunqiang Hu, Hang Liu:

An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions. 655-663 - Ming Yang, Rong Jiang, Tilei Gao, Wanyu Xie, Jia Wang:

Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain. 664-673 - Xu Wu:

Study on Trust Model for Multi-users in Cloud Computing. 674-682 - Zhengjun Cao, Chong Mao, Lihua Liu, Wenping Kong, Jinbo Wang:

Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. 683-688 - Divyashikha Sethia, Huzur Saran, Daya Gupta:

CP-ABE for Selective Access with Scalable Revocation: A Case Study for Mobile-based Healthfolder. 689-701 - Prakash G. L, Manish Prateek, Inder Singh:

Data Verification Using Block Level Batch Auditing on Multi-cloud Server. 702-709 - Tao Feng, Jiaqi Guo:

A New Access Control System Based on CP-ABE in Named Data Networking. 710-720 - Shaila Ghanti, G. M. Naik:

Defense Techniques of SYN Flood Attack Characterization and Comparisons. 721-729 - K. Murugan, P. Suresh:

Efficient Anomaly Intrusion Detection Using Hybrid Probabilistic Techniques in Wireless Ad Hoc Network. 730-737 - K. Veena, K. Meena:

Identification of Cyber Criminal by Analysing the Users Profile. 738-745 - V. S. Janani, M. S. K. Manikandan:

An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks. 746-753 - Yunfa Li, Yangyang Shen, Mingyi Li:

A Credible Mechanism of Service about Data Resource in Cloud Computing. 754-761 - Ke Gu, LinYu Wang, Na Wu, NianDong Liao:

Traceable Certificateless Ring Signature Scheme For No Full Anonymous Applications. 762-773 - Kazi Md. Rokibul Alam, Adnan Maruf, Md. Rezaur Rahman Rakib, G. G. Md. Nawaz Ali, Peter Han Joo Chong, Yasuhiko Morimoto:

An Untraceable Voting Scheme Based on Pairs of Signatures. 774-787 - Youssef Harmouch, Rachid Elkouch, Hussain Ben-Azza:

Multiple New Formulas for Cipher Performance Computing. 788-800 - Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang:

A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching. 801-804 - Cen Zuo:

Defense of Computer Network Viruses Based on Data Mining Technology. 805-810
Volume 20, Number 5, September 2018
- Abdullah Abdulrahman Al-khatib, Rosilah Hassan:

Impact of IPSec Protocol on the Performance of Network Real-Time Applications: A Review. 811-819 - Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou:

Improving Network Intrusion Detection Using Geometric Mean LDA. 820-826 - Umesh Kumar Singh, Chanchala Joshi:

Scalable Approach Towards Discovery of Unknown Vulnerabilities. 827-835 - Ade Kurniawan, Imam Riadi:

Detection and Analysis Cerber Ransomware Using Network Forensics Behavior Based. 836-843 - KwangHyok Jo, Weimin Lei, Zhaozheng Li, Xiaoshi Song:

A Reversible Watermarking Algorithm in the Lossless Mode of HEVC. 844-852 - Travis Atkison, Stanislav Ponomarev, Randy K. Smith, Bernard Chen:

Feature Extraction Optimization for Network Intrusion Detection in Control System Networks. 853-861 - Yanhui Lv, Kexin Liu, Deyu Zhang, Zhuo Miao:

A Secure Routing Protocol Based on Reputation Mechanism. 862-871 - Lin Teng, Hang Li, Jie Liu, Shoulin Yin:

An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-Attribute Sorting Method. 872-878 - Shaoquan Jiang, Min Li, Zailiang Tang:

A New Scheme for Source-location Privacy in Wireless Sensor Networks. 879-889 - Raja Muthalagu, Subeen Jain:

Application of FSM Machine and S-Box in KASUMI Block Cipher to Improve Its Resistance Against Attack. 890-897 - Muawia A. Elsadig, Yahia A. Fadlalla:

An Efficient Approach to Resolve Covert Channels. 898-906 - Yanhua Wang, Yaqiu Liu, Kun Wang:

A Secure and Efficient Ciphertext Encryption Scheme Based on Attribute and Support Strategy Dynamic Update Via Hybrid Encryption. 907-913 - Lincy Elizebeth Jim, Mark A. Gregory:

A Grudger Based AIS Approach to Coerce Selfish Node Cooperation in MANET. 914-922 - Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu:

Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS. 923-930 - Shuang-Gen Liu, Xue-Jing Sun:

A Fast Scalar Multiplication Algorithm Based on Alternate-Zeckendorf Representation. 931-937 - Rui Xie, Jie Ling, Daowei Liu:

A Wireless Key Generation Algorithm for RFID System Based on Bit Operation. 938-950 - Vegi Srinivas, Vatsavayi Valli Kumari, K. V. S. V. N. Raju:

Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust. 951-959 - Xiaolong Xu, Zhonghe Gao, Lijuan Han:

An Efficient Compromised Nodes Detection System in Wireless Sensor Networks. 960-970 - Kazeem O. Okosun, Samson Ogunlade, Ebenezer Bonyah:

Optimal Control Analysis of Computer Virus Transmission. 971-982 - Li Lin:

A Detection and Defense Technology for Information-stealing and Deceitful Trojan Viruses Based on Behavioral Features. 983-987 - Samuel Jackson, Jeremy Straub, Scott Kerlin:

Exploring a Novel Cryptographic Solution for Securing Small Satellite Communications. 988-997 - Cheng-Yi Tsai, Cheng-Ying Yang, Iuon-Chang Lin, Min-Shiang Hwang:

A Survey of E-book Digital Right Management. 998-1004
Volume 20, Number 6, November 2018
- Abdelrahman Desoky:

Uniform Resource Locator Based Steganography Methodology. 1005-1015 - Jialiang Zhang:

Application of Artificial Intelligence Technology in Computer Network Security. 1016-1021 - Govand Salih Kadir, Ihsan Alshahib Lami:

Detection and Isolation of Wormholes in Mobile Ad-hoc Networks Using Localization Information. 1022-1032 - Jian-Hua Huang, Liang-Jie Chen, Fan-Chao Li, Ze Fang:

Security Quantification Method for Intrusion Tolerance Systems Based on Multi-recovery. 1033-1041 - Mahesh Gangarde, Janardhan Chitode, Shruti Oza:

Application of Video Watermarking Using Subdivision Technique to Enhance Information Security. 1042-1052 - Osama Ahmed Khashan, Nour Mahmoud Khafajah:

Secure Stored Images Using Transparent Crypto Filter Driver. 1053-1060 - Yongliang Zhao, Quan Qian:

Android Malware Identification Through Visual Exploration of Disambly Files. 1061-1073 - Hua Ma, Xiaoyu Han, Ting Peng, Linchao Zhang:

Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing. 1074-1084 - V. Sangeetha, S. Swapna Kumar:

Probabilistic Framework for Assessing the Threat Level using Novel Decision Constructs in Mobile Adhoc Network. 1085-1092 - Animesh Hazra, Soumya Ghosh, Sampad Jash:

A Review on DNA Based Cryptographic Techniques. 1093-1104 - Chunhu Li, Guangchun Luo, Chunbao Li:

A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map. 1105-1114 - V. Preetha, K. Chitra:

ZBMRP: Zone Based MANET Routing Protocol with Genetic Algorithm and Security Enhancement Using Neural Network Learning. 1115-1124 - Lili Yao, Jiabing Liu, Dejun Wang, Jing Li, Bo Meng:

Formal Analysis of SDN Authentication Protocol with Mechanized Protocol Verifier in the Symbolic Model. 1125-1136 - Xiuxia Tian, Qian Song, Fuliang Tian:

Multidimensional Data Aggregation Scheme For Smart Grid with Differential Privacy. 1137-1148 - Kittur P. Kibiwott, Fengli Zhang, Anyembe Andrew Omala, Daniel Adu-Gyamfi:

Secure Cloudlet-based eHealth Big Data System with Fine-Grained Access Control and Outsourcing Decryption from ABE. 1149-1162 - Eman Tarek, Osama Ouda, Ahmed Atwan:

Image-based Multimodal Biometric Authentication Using Double Random Phase Encoding. 1163-1174 - Ledi Fang, Shundong Li, Wenli Wang:

An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines. 1175-1182 - Caixue Zhou, Yue Zhang, Lingmin Wang:

A Provable Secure Identity-based Generalized Proxy Signcryption Scheme. 1183-1193 - Wenjie Yang, Min-Rong Chen, Guo-Qiang Zeng:

Cryptanalysis of Two Strongly Unforgeable Identity-based Signatures in the Standard Model. 1194-1199 - Lin Teng, Hang Li:

A High-efficiency Discrete Logarithm-based Multi-proxy Blind Signature Scheme via Elliptic Curve and Bilinear Mapping. 1200-1205 - Kamsiah Mohamed, Fakariah Hani Hj Mohd Ali, Suriyani Ariffin, Nur Hafiza Zakaria, Mohd Nazran Mohammed Pauzi:

An Improved AES S-box Based on Fibonacci Numbers and Prime Factor. 1206-1214 - Yun Zhang:

Research on the Security Protection of E-Commerce Information under the Background of Mobile Consumption. 1215-1220 - Li-Chin Huang, Ting-Yi Chang, Min-Shiang Hwang:

A Conference Key Scheme Based on the Diffie-Hellman Key Exchange. 1221-1226 - Lei Zhang:

Supervision and Investigation of Internet Fraud Crimes. 1227-1233

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














