Journal: I. J. Network Security

Volume 16, Issue 1

1 -- 13Pei-Shan Chung, Chi-Wei Liu, Min-Shiang Hwang. A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments
14 -- 18B. Karthikeyan, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti, M. Gomathymeenakshi. An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image
19 -- 28Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai. Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
29 -- 39Jayaprakash Kar. Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network
40 -- 45Jian-Guo Sun, Guo-Yin Zhang, Ai-Hong Yao, Jun-Peng Wu. A Reversible Digital Watermarking Algorithm for Vector Maps
46 -- 52Soniya Balram, M. Wilscy. User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection
53 -- 57Navaneet Ojha, Sahadeo Padhye. Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key
58 -- 64Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang. An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem
65 -- 70A. Prakash, Rajeswari Mukesh. A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits
71 -- 77Yunqi Dou, Jiang Weng, Chuangui Ma. Improved Fault Attack Against Eta Pairing
78 -- 80Debiao He, Muhammad Khurram Khan, Shuhua Wu. On the Security of a RSA-based Certificateless Signature Scheme