Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijnsec/ijnsec17.bht:"
@article{DBLP:journals/ijnsec/AboshoshaEEE15, author = {Ashraf Aboshosha and Kamal A. ElDahshan and Eman K. Elsayed and Ahmed A. Elngar}, title = {{EA} Based Dynamic Key Generation in {RC4} Ciphering Applied to {CMS}}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {405--412}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p405-412.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AboshoshaEEE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BarthakurDG15, author = {Pijush Barthakur and Manoj Dahal and Mrinal Kanti Ghose}, title = {Adoption of a Fuzzy Based Classification Model for {P2P} Botnet Detection}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {522--534}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p522-534.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BarthakurDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BhuyanBK15, author = {Monowar H. Bhuyan and Dhruba K. Bhattacharyya and Jugal K. Kalita}, title = {Towards Generating Real-life Datasets for Network Intrusion Detection}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {683--701}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p683-701.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BhuyanBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CaoC15, author = {Zhengjun Cao and Hanyue Cao}, title = {Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {103--109}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p103-109.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CaoC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CaoL15, author = {Zhengjun Cao and Lihua Liu}, title = {Improvement of Green-Hohenberger Adaptive Oblivious Transfer: {A} Review}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {454--462}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p454-462.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CaoL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChangYW15, author = {Chin{-}Chen Chang and Jen{-}Ho Yang and Yu{-}Ching Wu}, title = {An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {702--707}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p702-707.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChangYW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CheMLW15, author = {Tianwei Che and Jianfeng Ma and Na Li and Chao Wang}, title = {A Security Quantitative Analysis Method For Access Control Based on Security Entropy}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {517--521}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p517-521.pdf}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CheMLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Chen15, author = {Jan{-}Min Chen}, title = {An Auto-tuning Sanitizing System for Mitigating Injection Flaws}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {189--198}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p189-198.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Chen15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChenC15, author = {Yalin Chen and Jue{-}Sam Chou}, title = {On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking"}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {708--711}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p708-711.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChenC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChenLSW15, author = {Yi{-}Hui Chen and Chih{-}Yang Lin and Wanutchaporn Sirakriengkrai and I{-}Chun Weng}, title = {Repairable Image Authentication Scheme}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {439--444}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p439-444.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChenLSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChenPL15, author = {Yi{-}Hui Chen and Panyaporn Prangjarote and Chih{-}Yang Lin}, title = {Self-verifiable Secret Sharing Scheme with Locatability for Halftone Images}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {3}, pages = {238--242}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n3/ijns-2015-v17-n3-p238-242.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChenPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Cheng15, author = {Qingfeng Cheng}, title = {Security Analysis of a Pairing-free Identity-based Authenticated Group Key Agreement Protocol for Imbalanced Mobile Networks}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {494--496}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p494-496.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Cheng15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChengT15, author = {Qingfeng Cheng and Chunming Tang}, title = {Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {678--682}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p678-682.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChengT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChengW15, author = {Lin Cheng and Qiaoyan Wen}, title = {An Improved Certificateless Signcryption in the Standard Model}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {3}, pages = {229--237}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n3/ijns-2015-v17-n3-p229-237.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChengW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChengW15a, author = {Lin Cheng and Qiaoyan Wen}, title = {An Improved Certificateless Signcryption in the Standard Model}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {597--606}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p597-606.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChengW15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChiCLH15, author = {Yi{-}Lun Chi and Cheng Hao Chen and Iuon{-}Chang Lin and Min{-}Shiang Hwang}, title = {The Secure Transaction Protocol in {NFC} Card Emulation Mode}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {431--438}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p431-438.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChiCLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChikoucheFCB15, author = {Noureddine Chikouche and Cherif Foudil and Pierre{-}Louis Cayrel and Mohamed Benmohammed}, title = {Improved {RFID} Authentication Protocol Based on Randomized McEliece Cryptosystem}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {413--422}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p413-422.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChikoucheFCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ClarkA15, author = {Patrick G. Clark and Arvin Agah}, title = {Firewall Policy Diagram: Structures for Firewall Behavior Comprehension}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {150--159}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p150-159.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ClarkA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/DermanilianSEKC15, author = {Hoseb Dermanilian and Farah Saab and Imad H. Elhajj and Ayman I. Kayssi and Ali Chehab}, title = {Energy-Efficient Security for Voice over {IP}}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {1}, pages = {7--22}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p7-22.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/DermanilianSEKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/FengGLW15, author = {Bin Feng and Cheng Guo and Mingchu Li and Zhi{-}Hui Wang}, title = {A Novel Proactive Multi-secret Sharing Scheme}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {123--128}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p123-128.pdf}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/FengGLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/FengSH15, author = {Tung{-}Huang Feng and Neng{-}Yih Shih and Min{-}Shiang Hwang}, title = {A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {712--721}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p712-721.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/FengSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Fu15, author = {Xingbing Fu}, title = {Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {142--149}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p142-149.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Fu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/FuZL15, author = {Xingbing Fu and Shengke Zeng and Fagen Li}, title = {Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {661--671}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p661-671.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/FuZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/FujiwaraDMS15, author = {Mikio Fujiwara and Tomoyasu Domeki and Shiho Moriai and Masahide Sasaki}, title = {Highly Secure Network Switches with Quantum Key Distribution Systems}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {1}, pages = {34--39}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p34-39.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/FujiwaraDMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GengXQL15, author = {Ji Geng and Hu Xiong and Zhiguang Qin and Fagen Li}, title = {On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {129--134}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p129-134.pdf}, timestamp = {Fri, 18 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GengXQL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GuoC15, author = {Cheng Guo and Chin{-}Chen Chang}, title = {A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {165--173}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p165-173.pdf}, timestamp = {Sat, 18 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/GuoC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HakiemSR15, author = {Nashrul Hakiem and Mohammad Umar Siddiqi and Hashum Mohamed Rafiq}, title = {Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {1}, pages = {49--56}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p49-56.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HakiemSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HewettK15, author = {Rattikorn Hewett and Phongphun Kijsanayothin}, title = {Ranking Intrusion Likelihoods with Exploitability of Network Vulnerabilities in a Large-Scale Attack Model}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {383--394}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p383-394.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HewettK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HuangLT15, author = {Hui{-}Feng Huang and Pin{-}Han Lin and Min{-}Hsuan Tsai}, title = {Convertible Multi-authenticated Encryption Scheme for Data Communication}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {1}, pages = {40--48}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p40-48.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HuangLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HuangPDQ15, author = {Huajun Huang and Shuang Pang and Qiong Deng and Jiaohua Qin}, title = {A Component Histogram Map Based Text Similarity Detection Algorithm}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {637--642}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p637-642.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HuangPDQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HuangZL15, author = {Yuan Huang and Shengke Zeng and Xingwei Liu}, title = {Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {135--141}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p135-141.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HuangZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JavadzadehA15, author = {Ghazaleh Javadzadeh and Reza Azmi}, title = {IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {754--770}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p754-770.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/JavadzadehA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Kar15, author = {Jayaprakash Kar}, title = {Provably Secure Identity-based Aggregate Signcryption Scheme in Random Oracles}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {580--587}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p580-587.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Kar15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/King15, author = {Brian King}, title = {A Dynamic Threshold Decryption Scheme Using Bilinear Pairings}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {771--778}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p771-778.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/King15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LeCC15, author = {Hai{-}Duong Le and Chin{-}Chen Chang and Yeh{-}Chieh Chou}, title = {A Novel Untraceable Authentication Scheme for Mobile Roaming in {GLOMONET}}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {395--404}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p395-404.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LeCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LeeCL15, author = {Cheng{-}Chi Lee and Shih{-}Ting Chiu and Chun{-}Ta Li}, title = {Improving Security of {A} Communication-efficient Three-party Password Authentication Key Exchange Protocol}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {1}, pages = {1--6}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p1-6.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LeeCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LeeCPL15, author = {Chin{-}Feng Lee and Chin{-}Chen Chang and Pei{-}Yan Pai and Chia{-}Ming Liu}, title = {Adjustment Hiding Method Based on Exploiting Modification Direction}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {607--618}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p607-618.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LeeCPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiLC15, author = {Ci{-}Lin Li and Chih{-}Yang Lin and Tzung{-}Her Chen}, title = {Efficient Compression-Jointed Quality Controllable Scrambling Method for {H.264/SVC}}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {3}, pages = {282--289}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n3/ijns-2015-v17-n3-p282-289.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiZ15, author = {Qinyi Li and Fengli Zhang}, title = {A Fully Secure Attribute Based Broadcast Encryption Scheme}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {3}, pages = {255--263}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n3/ijns-2015-v17-n3-p255-263.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LimaMSD15, author = {Felipe dos Anjos Lima and Edward David Moreno and Dellano Oliveira D. dos Santos and Wanderson Roger Azevedo Dias}, title = {Energy Characterization of a Security Module in {ARM} Processor}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {1}, pages = {72--78}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p72-78.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LimaMSD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Lin0LC15, author = {Changlu Lin and Yong Li and Kewei Lv and Chin{-}Chen Chang}, title = {Ciphertext-Auditable Identity-Based Encryption}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {1}, pages = {23--28}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p23-28.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Lin0LC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LingZ15, author = {Jie Ling and Guangqiang Zhao}, title = {An Improved Anonymous Password Authentication Scheme Using Nonce and Bilinear Pairings}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {787--794}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p787-794.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LingZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiuCWY15, author = {Chenglian Liu and Chin{-}Chen Chang and Zhi{-}Pan Wu and Shi{-}Lin Ye}, title = {A Study of Relationship between {RSA} Public Key Cryptosystem and Goldbach's Conjecture Properties}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {445--453}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p445-453.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiuCWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Ma0Z15, author = {Xu Ma and Jin Li and Fangguo Zhang}, title = {Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {743--753}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p743-753.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Ma0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MahmoudNM15, author = {Muhammad Mahmoud and Manjinder Nir and Ashraf Matrawy}, title = {A Survey on Botnet Architectures, Detection and Defences}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {3}, pages = {264--281}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n3/ijns-2015-v17-n3-p264-281.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MahmoudNM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ManivannanN15, author = {Manivannan Doraipandian and P. Neelamegam}, title = {An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {651--660}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p651-660.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ManivannanN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MingW15, author = {Yang Ming and Yumin Wang}, title = {On the Security of Three Public Auditing Schemes in Cloud Computing}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {795--802}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p795-802.pdf}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/MingW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MohananthiniY15, author = {Natarajan Mohananthini and Govindarajan Yamuna}, title = {A Study of {DWT-SVD} Based Multiple Watermarking Scheme for Medical Images}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {558--568}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p558-568.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MohananthiniY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/NagBSS15, author = {Amitava Nag and Sushanta Biswas and Debasree Sarkar and Partha Pratim Sarkar}, title = {Semi Random Position Based Steganography for Resisting Statistical Steganalysis}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {1}, pages = {57--65}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p57-65.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/NagBSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/NareshM15, author = {Vankamamidi Srinivasa Naresh and Nistala V. E. S. Murthy}, title = {Elliptic Curve Based Dynamic Contributory Group Key Agreement Protocol for Secure Group Communication over Ad-hoc Networks}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {588--596}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p588-596.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/NareshM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/PadmavathyB15, author = {R. Padmavathy and Chakravarthy Bhagvati}, title = {A New Method for Computing {DLP} Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {3}, pages = {243--254}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n3/ijns-2015-v17-n3-p243-254.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/PadmavathyB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/PanLZWZ15, author = {Chunhua Pan and Shunpeng Li and Qihui Zhu and Chunzhi Wang and Mingwu Zhang}, title = {Notes on Proxy Signcryption and Multi-proxy Signature Schemes}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {1}, pages = {29--33}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p29-33.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/PanLZWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/PanMA15, author = {Shengyi Pan and Thomas H. Morris and Uttam Adhikari}, title = {A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {174--188}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p174-188.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/PanMA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/PatelJ15, author = {Hasmukh Patel and Devesh C. Jinwala}, title = {Automated Analysis of Internet Key Exchange Protocol v2 for Denial of Service Attacks}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {1}, pages = {66--71}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p66-71.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/PatelJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/QadirSA15, author = {Sana Qadir and Mohammad Umar Siddiqi and Wajdi F. M. Al{-}Khateeb}, title = {Analysing and Improving Performance and Security of Cryptographically Generated Address Algorithm for Mobile IPv6 Networks}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {535--547}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p535-547.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/QadirSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RanjaniBA15, author = {Reddi Siva Ranjani and Dhavala Lalitha Bhaskari and Peri S. Avadhani}, title = {An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {510--516}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p510-516.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RanjaniBA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RenWZH15, author = {Yanli Ren and Shuozhong Wang and Xinpeng Zhang and Min{-}Shiang Hwang}, title = {An Efficient Batch Verifying Scheme for Detecting Illegal Signatures}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {463--470}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p463-470.pdf}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RenWZH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SarkarM15, author = {Arindam Sarkar and Jyotsna Kumar Mandal}, title = {Cryptanalysis of Key Exchange method in Wireless Communication}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {484--493}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p484-493.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SarkarM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ScheperR15, author = {Chris Scheper and William J. J. Roberts}, title = {Anomaly Detection Using an MMPP-based {GLRT}}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {672--677}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p672-677.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ScheperR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ShiG15, author = {Huixian Shi and Rui Guo}, title = {Provably-Secure Certificateless Key Encapsulation Mechanism for e-Healthcare System}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {548--557}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p548-557.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ShiG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SunSH15, author = {Jia{-}Rong Sun and Mao{-}Lin Shih and Min{-}Shiang Hwang}, title = {A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {497--509}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p497-509.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SunSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TanhaHS15, author = {Maryam Tanha and Fazirulhisyam Hashim and Shamala Subramaniam}, title = {Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {365--382}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p365-382.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TanhaHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TiwariP15, author = {Namita Tiwari and Sahadeo Padhye}, title = {Provable Secure Multi-Proxy Signature Scheme without Bilinear Maps}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {736--742}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p736-742.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TiwariP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Toorani15, author = {Mohsen Toorani}, title = {Cryptanalysis of Two {PAKE} Protocols for Body Area Networks and Smart Environments}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {629--636}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p629-636.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Toorani15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TrojaB15, author = {Erald Troja and Spiridon Bakiras}, title = {Leveraging {P2P} Interactions for Efficient Location Privacy in Database-driven Dynamic Spectrum Access}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {569--579}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p569-579.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TrojaB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TsaiHP15, author = {Yuan{-}Yu Tsai and Wen{-}Ching Huang and Bo{-}Feng Peng}, title = {An Efficient and Distortion-controllable Information Hiding Algorithm for 3D Polygonal Models with Adaptation}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {1}, pages = {79--84}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p79-84.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TsaiHP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/VigilaM15, author = {S. Maria Celestin Vigila and K. Muneeswaran}, title = {Hiding of Confidential Data in Spatial Domain Images using Image Interpolation}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {722--727}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p722-727.pdf}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/VigilaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangCC15, author = {Feng Wang and Chin{-}Chen Chang and Yeh{-}Chieh Chou}, title = {Group Authentication and Group Key Distribution for Ad Hoc Networks}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {199--207}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p199-207.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangLLFY15, author = {Yongtao Wang and Xiaonan Liu and Lulu Liang and Weiduan Feng and Guang Yang}, title = {Mitigating Key Escrow in Attribute-Based Encryption}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {1}, pages = {94--102}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p94-102.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangLLFY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangP15, author = {Ying Wang and Xinguang Peng}, title = {Cryptanalysis of Two Efficient Password-based Authentication Schemes Using Smart Cards}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {728--735}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p728-735.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangYZ15, author = {Jie Wang and Xiao Yu and Ming Zhao}, title = {Fault-tolerant Verifiable Keyword Symmetric Searchable Encryption in Hybrid Cloud}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {471--483}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p471-483.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangZYM15, author = {Fangwei Wang and Yunkai Zhang and Yong Yang and Jianfang Ma}, title = {Global Analysis of a {SEIQV} Epidemic Model for Scanning Worms with Quarantine Strategy}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {4}, pages = {423--430}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n4/ijns-2015-v17-n4-p423-430.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangZYM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WijayantoH15, author = {Heri Wijayanto and Min{-}Shiang Hwang}, title = {Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {160--164}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p160-164.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WijayantoH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/XiongGQZ15, author = {Hu Xiong and Ji Geng and Zhiguang Qin and Guobin Zhu}, title = {Cryptanalysis of Attribute-based Ring Signcryption Scheme}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {224--228}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p224-228.pdf}, timestamp = {Fri, 18 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/XiongGQZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/XuWWZQZ15, author = {Degang Xu and Zhao Wu and Zhongbo Wu and Qilin Zhang and Leihua Qin and Jingli Zhou}, title = {Internet of Things: Hotspot-based Discovery Service Architecture with Security Mechanism}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {208--216}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p208-216.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/XuWWZQZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/XuXQQ15, author = {Boqing Xu and Qun Xiao and Zhenxing Qian and Chuan Qin}, title = {Unequal Protection Mechanism for Digital Speech Transmission Based on Turbo Codes}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {1}, pages = {85--93}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p85-93.pdf}, timestamp = {Wed, 24 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/XuXQQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhaiLCM15, author = {Shengyun Zhai and Fan Li and Chin{-}Chen Chang and Qian Mao}, title = {A Meaningful Scheme for Sharing Secret Images Using Mosaic Images}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {643--649}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p643-649.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhaiLCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangLHT15, author = {Xiangsong Zhang and Zhenhua Liu and Yupu Hu and Tsuyoshi Takagi}, title = {Revocable Identity-based Signcryption Scheme Without Random Oracles}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {110--122}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p110-122.pdf}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangLHT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangX15, author = {Xiujie Zhang and Chunxiang Xu}, title = {A Practical Forward-Secure Public-Key Encryption Scheme with Untrusted Update}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {5}, pages = {619--628}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n5/ijns-2015-v17-n5-p619-628.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhaoYWXQ15, author = {Yang Zhao and Feng Yue and Songyang Wu and Hu Xiong and Zhiguang Qin}, title = {Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {6}, pages = {779--786}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n6/ijns-2015-v17-n6-p779-786.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhaoYWXQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhaoYY15, author = {Yi Zhao and Qiliang Yang and Bo Yang}, title = {Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {217--223}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p217-223.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhaoYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.