Search dblp for Publications

export results for "toc:db/journals/ijnsec/ijnsec17.bht:"

 download as .bib file

@article{DBLP:journals/ijnsec/AboshoshaEEE15,
  author       = {Ashraf Aboshosha and
                  Kamal A. ElDahshan and
                  Eman K. Elsayed and
                  Ahmed A. Elngar},
  title        = {{EA} Based Dynamic Key Generation in {RC4} Ciphering Applied to {CMS}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {405--412},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p405-412.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AboshoshaEEE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BarthakurDG15,
  author       = {Pijush Barthakur and
                  Manoj Dahal and
                  Mrinal Kanti Ghose},
  title        = {Adoption of a Fuzzy Based Classification Model for {P2P} Botnet Detection},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {522--534},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p522-534.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BarthakurDG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BhuyanBK15,
  author       = {Monowar H. Bhuyan and
                  Dhruba K. Bhattacharyya and
                  Jugal K. Kalita},
  title        = {Towards Generating Real-life Datasets for Network Intrusion Detection},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {683--701},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p683-701.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BhuyanBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CaoC15,
  author       = {Zhengjun Cao and
                  Hanyue Cao},
  title        = {Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {103--109},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p103-109.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CaoC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CaoL15,
  author       = {Zhengjun Cao and
                  Lihua Liu},
  title        = {Improvement of Green-Hohenberger Adaptive Oblivious Transfer: {A}
                  Review},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {454--462},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p454-462.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CaoL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChangYW15,
  author       = {Chin{-}Chen Chang and
                  Jen{-}Ho Yang and
                  Yu{-}Ching Wu},
  title        = {An Efficient and Practical Authenticated Communication Scheme for
                  Vehicular Ad Hoc Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {702--707},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p702-707.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChangYW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CheMLW15,
  author       = {Tianwei Che and
                  Jianfeng Ma and
                  Na Li and
                  Chao Wang},
  title        = {A Security Quantitative Analysis Method For Access Control Based on
                  Security Entropy},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {517--521},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p517-521.pdf},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CheMLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Chen15,
  author       = {Jan{-}Min Chen},
  title        = {An Auto-tuning Sanitizing System for Mitigating Injection Flaws},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {189--198},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p189-198.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Chen15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenC15,
  author       = {Yalin Chen and
                  Jue{-}Sam Chou},
  title        = {On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme
                  with Fast Anonymity Revoking"},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {708--711},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p708-711.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChenC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenLSW15,
  author       = {Yi{-}Hui Chen and
                  Chih{-}Yang Lin and
                  Wanutchaporn Sirakriengkrai and
                  I{-}Chun Weng},
  title        = {Repairable Image Authentication Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {439--444},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p439-444.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChenLSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenPL15,
  author       = {Yi{-}Hui Chen and
                  Panyaporn Prangjarote and
                  Chih{-}Yang Lin},
  title        = {Self-verifiable Secret Sharing Scheme with Locatability for Halftone
                  Images},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {238--242},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n3/ijns-2015-v17-n3-p238-242.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChenPL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Cheng15,
  author       = {Qingfeng Cheng},
  title        = {Security Analysis of a Pairing-free Identity-based Authenticated Group
                  Key Agreement Protocol for Imbalanced Mobile Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {494--496},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p494-496.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Cheng15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChengT15,
  author       = {Qingfeng Cheng and
                  Chunming Tang},
  title        = {Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement
                  with Optimal Round},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {678--682},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p678-682.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChengT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChengW15,
  author       = {Lin Cheng and
                  Qiaoyan Wen},
  title        = {An Improved Certificateless Signcryption in the Standard Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {229--237},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n3/ijns-2015-v17-n3-p229-237.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChengW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChengW15a,
  author       = {Lin Cheng and
                  Qiaoyan Wen},
  title        = {An Improved Certificateless Signcryption in the Standard Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {597--606},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p597-606.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChengW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChiCLH15,
  author       = {Yi{-}Lun Chi and
                  Cheng Hao Chen and
                  Iuon{-}Chang Lin and
                  Min{-}Shiang Hwang},
  title        = {The Secure Transaction Protocol in {NFC} Card Emulation Mode},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {431--438},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p431-438.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChiCLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChikoucheFCB15,
  author       = {Noureddine Chikouche and
                  Cherif Foudil and
                  Pierre{-}Louis Cayrel and
                  Mohamed Benmohammed},
  title        = {Improved {RFID} Authentication Protocol Based on Randomized McEliece
                  Cryptosystem},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {413--422},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p413-422.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChikoucheFCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ClarkA15,
  author       = {Patrick G. Clark and
                  Arvin Agah},
  title        = {Firewall Policy Diagram: Structures for Firewall Behavior Comprehension},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {150--159},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p150-159.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ClarkA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/DermanilianSEKC15,
  author       = {Hoseb Dermanilian and
                  Farah Saab and
                  Imad H. Elhajj and
                  Ayman I. Kayssi and
                  Ali Chehab},
  title        = {Energy-Efficient Security for Voice over {IP}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {7--22},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p7-22.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/DermanilianSEKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FengGLW15,
  author       = {Bin Feng and
                  Cheng Guo and
                  Mingchu Li and
                  Zhi{-}Hui Wang},
  title        = {A Novel Proactive Multi-secret Sharing Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {123--128},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p123-128.pdf},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/FengGLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FengSH15,
  author       = {Tung{-}Huang Feng and
                  Neng{-}Yih Shih and
                  Min{-}Shiang Hwang},
  title        = {A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor
                  Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {712--721},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p712-721.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/FengSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Fu15,
  author       = {Xingbing Fu},
  title        = {Unidirectional Proxy Re-Encryption for Access Structure Transformation
                  in Attribute-based Encryption Schemes},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {142--149},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p142-149.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Fu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FuZL15,
  author       = {Xingbing Fu and
                  Shengke Zeng and
                  Fagen Li},
  title        = {Blind Expressive Ciphertext Policy Attribute Based Encryption for
                  Fine Grained Access Control on the Encrypted Data},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {661--671},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p661-671.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/FuZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FujiwaraDMS15,
  author       = {Mikio Fujiwara and
                  Tomoyasu Domeki and
                  Shiho Moriai and
                  Masahide Sasaki},
  title        = {Highly Secure Network Switches with Quantum Key Distribution Systems},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {34--39},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p34-39.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/FujiwaraDMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GengXQL15,
  author       = {Ji Geng and
                  Hu Xiong and
                  Zhiguang Qin and
                  Fagen Li},
  title        = {On the Security of a Provably Secure Certificate Based Ring Signature
                  Without Pairing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {129--134},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p129-134.pdf},
  timestamp    = {Fri, 18 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GengXQL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GuoC15,
  author       = {Cheng Guo and
                  Chin{-}Chen Chang},
  title        = {A Novel Threshold Conference-Key Agreement Protocol Based on Generalized
                  Chinese Remainder Theorem},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {165--173},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p165-173.pdf},
  timestamp    = {Sat, 18 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GuoC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HakiemSR15,
  author       = {Nashrul Hakiem and
                  Mohammad Umar Siddiqi and
                  Hashum Mohamed Rafiq},
  title        = {Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification
                  in an Enterprise Local Area Network},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {49--56},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p49-56.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HakiemSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HewettK15,
  author       = {Rattikorn Hewett and
                  Phongphun Kijsanayothin},
  title        = {Ranking Intrusion Likelihoods with Exploitability of Network Vulnerabilities
                  in a Large-Scale Attack Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {383--394},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p383-394.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HewettK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuangLT15,
  author       = {Hui{-}Feng Huang and
                  Pin{-}Han Lin and
                  Min{-}Hsuan Tsai},
  title        = {Convertible Multi-authenticated Encryption Scheme for Data Communication},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {40--48},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p40-48.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HuangLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuangPDQ15,
  author       = {Huajun Huang and
                  Shuang Pang and
                  Qiong Deng and
                  Jiaohua Qin},
  title        = {A Component Histogram Map Based Text Similarity Detection Algorithm},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {637--642},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p637-642.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HuangPDQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuangZL15,
  author       = {Yuan Huang and
                  Shengke Zeng and
                  Xingwei Liu},
  title        = {Privacy-preserving Communication for VANETs with Conditionally Anonymous
                  Ring Signature},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {135--141},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p135-141.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HuangZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JavadzadehA15,
  author       = {Ghazaleh Javadzadeh and
                  Reza Azmi},
  title        = {IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic
                  Approach},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {754--770},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p754-770.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JavadzadehA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Kar15,
  author       = {Jayaprakash Kar},
  title        = {Provably Secure Identity-based Aggregate Signcryption Scheme in Random
                  Oracles},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {580--587},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p580-587.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Kar15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/King15,
  author       = {Brian King},
  title        = {A Dynamic Threshold Decryption Scheme Using Bilinear Pairings},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {771--778},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p771-778.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/King15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LeCC15,
  author       = {Hai{-}Duong Le and
                  Chin{-}Chen Chang and
                  Yeh{-}Chieh Chou},
  title        = {A Novel Untraceable Authentication Scheme for Mobile Roaming in {GLOMONET}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {395--404},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p395-404.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LeCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LeeCL15,
  author       = {Cheng{-}Chi Lee and
                  Shih{-}Ting Chiu and
                  Chun{-}Ta Li},
  title        = {Improving Security of {A} Communication-efficient Three-party Password
                  Authentication Key Exchange Protocol},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {1--6},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p1-6.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LeeCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LeeCPL15,
  author       = {Chin{-}Feng Lee and
                  Chin{-}Chen Chang and
                  Pei{-}Yan Pai and
                  Chia{-}Ming Liu},
  title        = {Adjustment Hiding Method Based on Exploiting Modification Direction},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {607--618},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p607-618.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LeeCPL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiLC15,
  author       = {Ci{-}Lin Li and
                  Chih{-}Yang Lin and
                  Tzung{-}Her Chen},
  title        = {Efficient Compression-Jointed Quality Controllable Scrambling Method
                  for {H.264/SVC}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {282--289},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n3/ijns-2015-v17-n3-p282-289.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiZ15,
  author       = {Qinyi Li and
                  Fengli Zhang},
  title        = {A Fully Secure Attribute Based Broadcast Encryption Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {255--263},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n3/ijns-2015-v17-n3-p255-263.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LimaMSD15,
  author       = {Felipe dos Anjos Lima and
                  Edward David Moreno and
                  Dellano Oliveira D. dos Santos and
                  Wanderson Roger Azevedo Dias},
  title        = {Energy Characterization of a Security Module in {ARM} Processor},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {72--78},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p72-78.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LimaMSD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Lin0LC15,
  author       = {Changlu Lin and
                  Yong Li and
                  Kewei Lv and
                  Chin{-}Chen Chang},
  title        = {Ciphertext-Auditable Identity-Based Encryption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {23--28},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p23-28.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Lin0LC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LingZ15,
  author       = {Jie Ling and
                  Guangqiang Zhao},
  title        = {An Improved Anonymous Password Authentication Scheme Using Nonce and
                  Bilinear Pairings},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {787--794},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p787-794.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LingZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuCWY15,
  author       = {Chenglian Liu and
                  Chin{-}Chen Chang and
                  Zhi{-}Pan Wu and
                  Shi{-}Lin Ye},
  title        = {A Study of Relationship between {RSA} Public Key Cryptosystem and
                  Goldbach's Conjecture Properties},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {445--453},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p445-453.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiuCWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Ma0Z15,
  author       = {Xu Ma and
                  Jin Li and
                  Fangguo Zhang},
  title        = {Refereed Computation Delegation of Private Sequence Comparison in
                  Cloud Computing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {743--753},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p743-753.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Ma0Z15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MahmoudNM15,
  author       = {Muhammad Mahmoud and
                  Manjinder Nir and
                  Ashraf Matrawy},
  title        = {A Survey on Botnet Architectures, Detection and Defences},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {264--281},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n3/ijns-2015-v17-n3-p264-281.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MahmoudNM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ManivannanN15,
  author       = {Manivannan Doraipandian and
                  P. Neelamegam},
  title        = {An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster
                  Wireless Sensor Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {651--660},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p651-660.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ManivannanN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MingW15,
  author       = {Yang Ming and
                  Yumin Wang},
  title        = {On the Security of Three Public Auditing Schemes in Cloud Computing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {795--802},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p795-802.pdf},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MingW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MohananthiniY15,
  author       = {Natarajan Mohananthini and
                  Govindarajan Yamuna},
  title        = {A Study of {DWT-SVD} Based Multiple Watermarking Scheme for Medical
                  Images},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {558--568},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p558-568.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MohananthiniY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/NagBSS15,
  author       = {Amitava Nag and
                  Sushanta Biswas and
                  Debasree Sarkar and
                  Partha Pratim Sarkar},
  title        = {Semi Random Position Based Steganography for Resisting Statistical
                  Steganalysis},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {57--65},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p57-65.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/NagBSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/NareshM15,
  author       = {Vankamamidi Srinivasa Naresh and
                  Nistala V. E. S. Murthy},
  title        = {Elliptic Curve Based Dynamic Contributory Group Key Agreement Protocol
                  for Secure Group Communication over Ad-hoc Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {588--596},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p588-596.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/NareshM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PadmavathyB15,
  author       = {R. Padmavathy and
                  Chakravarthy Bhagvati},
  title        = {A New Method for Computing {DLP} Based on Extending Smooth Numbers
                  to Finite Field for Ephemeral Key Recovery},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {243--254},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n3/ijns-2015-v17-n3-p243-254.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PadmavathyB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PanLZWZ15,
  author       = {Chunhua Pan and
                  Shunpeng Li and
                  Qihui Zhu and
                  Chunzhi Wang and
                  Mingwu Zhang},
  title        = {Notes on Proxy Signcryption and Multi-proxy Signature Schemes},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {29--33},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p29-33.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PanLZWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PanMA15,
  author       = {Shengyi Pan and
                  Thomas H. Morris and
                  Uttam Adhikari},
  title        = {A Specification-based Intrusion Detection Framework for Cyber-physical
                  Environment in Electric Power System},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {174--188},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p174-188.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PanMA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PatelJ15,
  author       = {Hasmukh Patel and
                  Devesh C. Jinwala},
  title        = {Automated Analysis of Internet Key Exchange Protocol v2 for Denial
                  of Service Attacks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {66--71},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p66-71.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PatelJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/QadirSA15,
  author       = {Sana Qadir and
                  Mohammad Umar Siddiqi and
                  Wajdi F. M. Al{-}Khateeb},
  title        = {Analysing and Improving Performance and Security of Cryptographically
                  Generated Address Algorithm for Mobile IPv6 Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {535--547},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p535-547.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/QadirSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RanjaniBA15,
  author       = {Reddi Siva Ranjani and
                  Dhavala Lalitha Bhaskari and
                  Peri S. Avadhani},
  title        = {An Extended Identity Based Authenticated Asymmetric Group Key Agreement
                  Protocol},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {510--516},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p510-516.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RanjaniBA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RenWZH15,
  author       = {Yanli Ren and
                  Shuozhong Wang and
                  Xinpeng Zhang and
                  Min{-}Shiang Hwang},
  title        = {An Efficient Batch Verifying Scheme for Detecting Illegal Signatures},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {463--470},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p463-470.pdf},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RenWZH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SarkarM15,
  author       = {Arindam Sarkar and
                  Jyotsna Kumar Mandal},
  title        = {Cryptanalysis of Key Exchange method in Wireless Communication},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {484--493},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p484-493.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SarkarM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ScheperR15,
  author       = {Chris Scheper and
                  William J. J. Roberts},
  title        = {Anomaly Detection Using an MMPP-based {GLRT}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {672--677},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p672-677.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ScheperR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ShiG15,
  author       = {Huixian Shi and
                  Rui Guo},
  title        = {Provably-Secure Certificateless Key Encapsulation Mechanism for e-Healthcare
                  System},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {548--557},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p548-557.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ShiG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SunSH15,
  author       = {Jia{-}Rong Sun and
                  Mao{-}Lin Shih and
                  Min{-}Shiang Hwang},
  title        = {A Survey of Digital Evidences Forensic and Cybercrime Investigation
                  Procedure},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {497--509},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p497-509.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SunSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TanhaHS15,
  author       = {Maryam Tanha and
                  Fazirulhisyam Hashim and
                  Shamala Subramaniam},
  title        = {Secure and Self-healing Control Centers of Critical Infrastructures
                  using Intrusion Tolerance},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {365--382},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p365-382.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TanhaHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TiwariP15,
  author       = {Namita Tiwari and
                  Sahadeo Padhye},
  title        = {Provable Secure Multi-Proxy Signature Scheme without Bilinear Maps},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {736--742},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p736-742.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TiwariP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Toorani15,
  author       = {Mohsen Toorani},
  title        = {Cryptanalysis of Two {PAKE} Protocols for Body Area Networks and Smart
                  Environments},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {629--636},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p629-636.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Toorani15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TrojaB15,
  author       = {Erald Troja and
                  Spiridon Bakiras},
  title        = {Leveraging {P2P} Interactions for Efficient Location Privacy in Database-driven
                  Dynamic Spectrum Access},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {569--579},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p569-579.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TrojaB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TsaiHP15,
  author       = {Yuan{-}Yu Tsai and
                  Wen{-}Ching Huang and
                  Bo{-}Feng Peng},
  title        = {An Efficient and Distortion-controllable Information Hiding Algorithm
                  for 3D Polygonal Models with Adaptation},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {79--84},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p79-84.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TsaiHP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/VigilaM15,
  author       = {S. Maria Celestin Vigila and
                  K. Muneeswaran},
  title        = {Hiding of Confidential Data in Spatial Domain Images using Image Interpolation},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {722--727},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p722-727.pdf},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/VigilaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangCC15,
  author       = {Feng Wang and
                  Chin{-}Chen Chang and
                  Yeh{-}Chieh Chou},
  title        = {Group Authentication and Group Key Distribution for Ad Hoc Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {199--207},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p199-207.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangLLFY15,
  author       = {Yongtao Wang and
                  Xiaonan Liu and
                  Lulu Liang and
                  Weiduan Feng and
                  Guang Yang},
  title        = {Mitigating Key Escrow in Attribute-Based Encryption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {94--102},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p94-102.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangLLFY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangP15,
  author       = {Ying Wang and
                  Xinguang Peng},
  title        = {Cryptanalysis of Two Efficient Password-based Authentication Schemes
                  Using Smart Cards},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {728--735},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p728-735.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangYZ15,
  author       = {Jie Wang and
                  Xiao Yu and
                  Ming Zhao},
  title        = {Fault-tolerant Verifiable Keyword Symmetric Searchable Encryption
                  in Hybrid Cloud},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {471--483},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p471-483.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangYZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangZYM15,
  author       = {Fangwei Wang and
                  Yunkai Zhang and
                  Yong Yang and
                  Jianfang Ma},
  title        = {Global Analysis of a {SEIQV} Epidemic Model for Scanning Worms with
                  Quarantine Strategy},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {4},
  pages        = {423--430},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p423-430.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangZYM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WijayantoH15,
  author       = {Heri Wijayanto and
                  Min{-}Shiang Hwang},
  title        = {Improvement on Timestamp-based User Authentication Scheme with Smart
                  Card Lost Attack Resistance},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {160--164},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p160-164.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WijayantoH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XiongGQZ15,
  author       = {Hu Xiong and
                  Ji Geng and
                  Zhiguang Qin and
                  Guobin Zhu},
  title        = {Cryptanalysis of Attribute-based Ring Signcryption Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {224--228},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p224-228.pdf},
  timestamp    = {Fri, 18 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XiongGQZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XuWWZQZ15,
  author       = {Degang Xu and
                  Zhao Wu and
                  Zhongbo Wu and
                  Qilin Zhang and
                  Leihua Qin and
                  Jingli Zhou},
  title        = {Internet of Things: Hotspot-based Discovery Service Architecture with
                  Security Mechanism},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {208--216},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p208-216.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XuWWZQZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XuXQQ15,
  author       = {Boqing Xu and
                  Qun Xiao and
                  Zhenxing Qian and
                  Chuan Qin},
  title        = {Unequal Protection Mechanism for Digital Speech Transmission Based
                  on Turbo Codes},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {85--93},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p85-93.pdf},
  timestamp    = {Wed, 24 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XuXQQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhaiLCM15,
  author       = {Shengyun Zhai and
                  Fan Li and
                  Chin{-}Chen Chang and
                  Qian Mao},
  title        = {A Meaningful Scheme for Sharing Secret Images Using Mosaic Images},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {643--649},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p643-649.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhaiLCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangLHT15,
  author       = {Xiangsong Zhang and
                  Zhenhua Liu and
                  Yupu Hu and
                  Tsuyoshi Takagi},
  title        = {Revocable Identity-based Signcryption Scheme Without Random Oracles},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {110--122},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p110-122.pdf},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangLHT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangX15,
  author       = {Xiujie Zhang and
                  Chunxiang Xu},
  title        = {A Practical Forward-Secure Public-Key Encryption Scheme with Untrusted
                  Update},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {619--628},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p619-628.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhaoYWXQ15,
  author       = {Yang Zhao and
                  Feng Yue and
                  Songyang Wu and
                  Hu Xiong and
                  Zhiguang Qin},
  title        = {Analysis and Improvement of Patient Self-controllable Multi-level
                  Privacy-preserving Cooperative Authentication Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {6},
  pages        = {779--786},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p779-786.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhaoYWXQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhaoYY15,
  author       = {Yi Zhao and
                  Qiliang Yang and
                  Bo Yang},
  title        = {Provably Secure Partially Blind Signature Scheme Based on Quadratic
                  Residue},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {217--223},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p217-223.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhaoYY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics