Journal: I. J. Network Security

Volume 19, Issue 2

167 -- 176Omprakash Kaiwartya, Mukesh Prasad, Shiv Prakash, Durgesh Samadhiya, Abdul Hanan Abdullah, andSyed Othmawi Abd Rahman. An Investigation on Biometric Internet Security
177 -- 181Chung-Huei Ling, Cheng-Chi Lee, Chou Chen Yang, Min-Shiang Hwang. A Secure and Efficient One-time Password Authentication Scheme for WSN
182 -- 192Vrushank M. Shah, A. K. Agarwal. Reliable Alert Fusion of Multiple Intrusion Detection Systems
193 -- 204Jayam Modi, Manav Prajapati, Abhinav Sharma, Ravi Ojha, Devesh Jinwala. A Secure Communication Model for Expressive Access Control Using CP-ABE
205 -- 216Qian Mao, Chin-Chen Chang. Turbo Unequal Error Protection Codes with Multiple Protection Levels
217 -- 228Yang Sun, Xueshuai Feng, Hongfeng Zhu. Two-phase Commit with Security Services: Using Distinctive Proofs to Relieve Fragile Communications
229 -- 235Lunzhi Deng, Huawei Huang, Yunyun Qu. Identity Based Proxy Signature from RSA without Pairings
236 -- 243Junshe Wang, Jinliang Liu, Hongbin Zhang. Access Control Based Resource Allocation in Cloud Computing Environment
244 -- 250Abdulghani Ali Ahmed, Noorul Ahlami Kamarul Zaman. Attack Intention Recognition: A Review
251 -- 259Dipen Contractor, Dhiren R. Patel. Accountability in Cloud Computing by Means of Chain of Trust
260 -- 271Lifeng Yuan, MingChu Li, Cheng Guo, Wei-Tong Hu, Zhi-Hui Wang. A Verifiable E-voting Scheme with Secret Sharing
272 -- 284Hua Ma, Ting Peng, Zhenhua Liu. Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe
285 -- 294Cai-Sen Chen, Xi Yu, Yang-Xia Xiang, Xiong Li, Tengrun Li. An Improved DPA Attack on DES with Forth and Back Random Round Algorithm
295 -- 312Maged Hamada Ibrahim. SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem
313 -- 322Xingbing Fu, Xunyun Nie, Fagen Li. Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map
323 -- 326Zhengjun Cao, Lihua Liu. A Note on Two Schemes for Secure Outsourcing of Linear Programming