Journal: I. J. Network Security

Volume 17, Issue 1

1 -- 6Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li. Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol
7 -- 22Hoseb Dermanilian, Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab. Energy-Efficient Security for Voice over IP
23 -- 28Changlu Lin, Yong Li 0002, Kewei Lv, Chin-Chen Chang. Ciphertext-Auditable Identity-Based Encryption
29 -- 33Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, Mingwu Zhang. Notes on Proxy Signcryption and Multi-proxy Signature Schemes
34 -- 39Mikio Fujiwara, Tomoyasu Domeki, Shiho Moriai, Masahide Sasaki. Highly Secure Network Switches with Quantum Key Distribution Systems
40 -- 48Hui-Feng Huang, Pin-Han Lin, Min-Hsuan Tsai. Convertible Multi-authenticated Encryption Scheme for Data Communication
49 -- 56Nashrul Hakiem, Mohammad Umar Siddiqi, Hashum Mohamed Rafiq. Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network
57 -- 65Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar. Semi Random Position Based Steganography for Resisting Statistical Steganalysis
66 -- 71Hasmukh Patel, Devesh C. Jinwala. Automated Analysis of Internet Key Exchange Protocol v2 for Denial of Service Attacks
72 -- 78Felipe dos Anjos Lima, Edward David Moreno, Dellano Oliveira D. dos Santos, Wanderson Roger Azevedo Dias. Energy Characterization of a Security Module in ARM Processor
79 -- 84Yuan-Yu Tsai, Wen-Ching Huang, Bo-Feng Peng. An Efficient and Distortion-controllable Information Hiding Algorithm for 3D Polygonal Models with Adaptation
85 -- 93Boqing Xu, Qun Xiao, Zhenxing Qian, Chuan Qin. Unequal Protection Mechanism for Digital Speech Transmission Based on Turbo Codes
94 -- 102Yongtao Wang, Xiaonan Liu, Lulu Liang, Weiduan Feng, Guang Yang. Mitigating Key Escrow in Attribute-Based Encryption