Journal: I. J. Network Security

Volume 15, Issue 5

321 -- 330Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang. A Study of Conjunctive Keyword Searchable Schemes
331 -- 340B. Sathish Babu, Jayashree N., Pallapa Venkataram. Performance Analysis of Steiner Tree-based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks
341 -- 349Dhruti Sharma, Devesh Jinwala. Key Generation Protocol in IBC
350 -- 356Debiao He, Weijing Zhao, Shuhua Wu. Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards
357 -- 364Jayaprakash Kar. ID-based Deniable Authentication Protocol based on Diffie-Hellman Problem on Elliptic Curve
365 -- 372P. D. Sheba Kezia Malarchelvi. A Semi-Fragile Image Content Authentication Technique based on Secure Hash in Frequency Domain
373 -- 383Radhika Goel, Anjali Sardana, Ramesh C. Joshi. Wireless Honeypot: Framework, Architectures and Tools
384 -- 389Haibo Tian, Xiaofeng Chen 0001, Baodian Wei, Yi Liu. Security Analysis of a Suite of Deniable Authentication Protocols
390 -- 396M. Uma, G. Padmavathi. A Survey on Various Cyber Attacks and their Classification
397 -- 404Christos K. Dimitriadis. Security for Mobile Operators in Practice
405 -- 410Jung-San Lee, Chin-Chen Chang, Kuo-Jui Wei. Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy