Journal: I. J. Network Security

Volume 19, Issue 6

863 -- 869Jong-Shin Chen, Cheng-Ying Yang, Min-Shiang Hwang. The Capacity Analysis in the Secure Cooperative Communication System
870 -- 879Mourade Azrour, Yousef Farhaoui, Mohammed Ouanan. A New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card
880 -- 888Rui-Hong Dong, Dong-Fang Wu, Qiu-yu Zhang. The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set
889 -- 898Zakariae Tbatou, Ahmed Asimi, Younes Asimi, Yassine Sadqi, Azidine Guezzaz. A New Mutuel Kerberos Authentication Protocol for Distributed Systems
899 -- 903Yuwei Xu, Chuankun Wu. Further Characterization of H Vectorial Functions
904 -- 911Guifa Hou, Zhijie Wang. A Robust and Efficient Remote Authentication Scheme from Elliptic Curve Cryptosystem
912 -- 921Arup Kumar Chattopadhyay, Amitava Nag, Koushik Majumder. Secure Data Outsourcing on Cloud Using Secret Sharing Scheme
922 -- 928I-Chun Weng, Tzung-Her Chen. A Novel Weighted Visual Cryptography Scheme with High Visual Quality
929 -- 939Ram Charan Baishya, Nozrul Hoque, Dhruba Kumar Bhattacharyya. DDoS Attack Detection Using Unique Source IP Deviation
940 -- 949Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin. An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet
950 -- 954Zhengjun Cao, Lihua Liu, Olivier Markowitch. Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
955 -- 965Safi Ibrahim, Mohamed Hamdy, Eman Shaaban. Towards an Optimum Authentication Service Allocation and Availability in VANETs
966 -- 972Ming Luo, Yuwei Wan, Donghua Huang. Certificateless Hybrid Signcryption Scheme with Known Session-Specific Temporary Information Security
973 -- 983Mohamed Ali Hamza, Jianfei Sun, Xuyun Nie, Zhiquan Qin, Hu Xiong. Revocable ABE with Bounded Ciphertext in Cloud Computing
984 -- 994M. Y. Mohamed Parvees, J. Abdul Samath, B. Parameswaran Bose. Protecting Large Size Medical Images with Logistic Map Using Dynamic Parameters and Key Image
995 -- 1004Rui Guo, Huixian Shi. Confidentiality-Preserving Personal Health Records in Tele-Healthcare System Using Authenticated Certificateless Encryption
1005 -- 1015Hang Gao, Mengting Hu, Tiegang Gao, Renhong Cheng. Double Verifiable Lossless Secret Sharing Based on Hyper-chaos Generated Random Grid
1016 -- 1023Jianjun Zhang, Huajun Huang, Lucai Wang, HaiJun Lin, Deng Gao. Coverless Text Information Hiding Method Using the Frequent Words Hash
1024 -- 1035Kavitha R, Padmavathi G. Advanced Random Time Queue Blocking for Effective Protection of Application Servers Against Low-Rate DoS Attacks
1036 -- 1043Zhi-yong Luo, Bo You, Peng Wang, Jie Su, Yi Liang. Analysis and Optimization of System Intrusion Tolerance Capacity Based on Markov
1044 -- 1052Yang Zhao, Pengcheng Fan, Haoting Cai, Zhiguang Qin, Hu Xiong. Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare
1053 -- 1061Jongho Moon, Donghoon Lee, Jaewook Jung, Dongho Won. Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme
1062 -- 1071Sang Ni, Mengbo Xie, Quan Qian. Clustering Based K-anonymity Algorithm for Privacy Preservation
1072 -- 1079Fang Ren, Dong Zheng, Weijing Wang. An Efficient Code Based Digital Signature Algorithm