Journal: I. J. Network Security

Volume 15, Issue 3

151 -- 160Sébastien Faye, Jean Frédéric Myoupo. Secure and Energy-efficient Geocast Protocol for Wireless Sensor Networks based on a Hierarchical Clustered Structure
161 -- 170Qinyi Li, Hu Xiong, Fengli Zhang, Shengke Zeng. An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext
171 -- 178Fangwei Wang, Yunkai Zhang, Honggang Guo, Changguang Wang. Combating Good Point Set Scanning-based Self-learning Worms by Using Predators
179 -- 189Jeng-Ping Lin, Jih-Ming Fu. Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party Setting
190 -- 204Mehdi Bateni, Ahmad Baraani, Ali Ghorbani. Using Artificial Immune System and Fuzzy Logic for Alert Correlation
205 -- 211Qi Duan, Mohit Virendra. On the Algorithms Related to Threshold Cryptography Based Network Protocols
212 -- 218Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang. An Efficient Oblivious Transfer Protocol Using Residue Number System
219 -- 230Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta. First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off