Journal: I. J. Network Security

Volume 15, Issue 4

231 -- 240Cheng-Chi Lee, Pei-Shan Chung, Min-Shiang Hwang. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments
241 -- 247Ramasamy Murugan, Arumugam Shanmugam. A Timer Based Acknowledgement Scheme for Node Misbehavior Detection and Isolation in MANET
248 -- 255Samir A. Elsagheer Mohamed. Secure Position Verification Approach for Wireless Ad-hoc Networks
256 -- 264H. K. Pathak, Manju Sanghi. Simple Three Party Key Exchange Protocol via Twin Diffie-Hellman Problem
265 -- 273R. Padmavathy, Chakravarthy Bhagvati. Index Calculus Method based on Smooth Numbers of ±1 over Zp
274 -- 279Samaneh Mashhadi. A Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers
280 -- 290Dulal Kar, Rashad Tatum, Keith Zejdlik. MHIP: Effective Key Management for Mobile Heterogeneous Sensor Networks
291 -- 297Chang N. Zhang, Qian Yu, Xiao Wei Liu. A Hybrid Fault Tolerant Approach for AES
298 -- 306Jaydeb Bhaumik, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury. Rain: Reversible Addition with Increased Nonlinearity
307 -- 312Lein Harn, Chin-Chen Chang, Hsiao-Ling Wu. An Anonymous Multi-Receiver Encryption Based on RSA
313 -- 316Blazej Brzezniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski. Attack against Ibrahim's Distributed Key Generation for RSA
317 -- 320Hu Xiong, Jian-bin Hu, Zhong Chen. Security Flaw of an ECC-based Signcryption Scheme with Anonymity