Journal: I. J. Network Security

Volume 20, Issue 2

201 -- 205Cheng-Yi Tsai, Pi-Fang Ho, Min-Shiang Hwang. A Secure Group Signature Scheme
206 -- 216Yi-Bo Huang, Qiu-yu Zhang, Wen-Jin Hu. Robust Speech Perception Hashing Authentication Algorithm Based on Spectral Subtraction and Multi-feature Tensor
217 -- 224Naresh Babu Muthu Mohan, Ardhani Sathya Narayana Chakravarthy, Cherukuri Ravindranath. Cryptanalysis of Design and Analysis of a Provably Secure Multi-server Authentication Scheme
225 -- 234Debasish Das, Dhruba Kumar Bhattacharyya. Defeating Cyber Attacks Due to Script Injection
235 -- 242Chunlin Jiang, Shi-lan Wu, Ke Gu. New Kind of Delegation-based Anonymous Authentication Scheme for Wireless Roaming Networks
243 -- 255Kakali Chatterjee, Lalita Priya. HKDS: A Hierarchical Key Distribution Scheme for Wireless Ad Hoc Network
256 -- 265Septafiansyah Dwi Putra, Ma'muri, Sarwono Sutikno, Yusuf Kurniawan, Adang Suwandi Ahmad. Design of an AES Device as Device Under Test in a DPA Attack
266 -- 277Sujuan Li, Yi Mu, Mingwu Zhang. Certificate-based Smooth Projective Hashing and Its Applications
278 -- 290Tzu-Chun Lin. A Study of Non-Abelian Public Key
291 -- 303Shilpa Deshpande, Rajesh Ingle. Evidence Based Trust Estimation Model for Cloud Computing Services
304 -- 312Sujatha Sivabalan, P. J. Radcliffe. Power Efficient Secure Web Servers
313 -- 322Hongfeng Zhu, Rui Wang. A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography
323 -- 331Cheng Guo, Chin-Chen Chang, Shih-Chang Chang. A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications
332 -- 336Jie Fang, Chenglian Liu. A Generalize Estimating the Ø(n) of Upper-Lower Bound to RSA Public Key Crytosystem
337 -- 344Celia Li, Helen Cheung, Cungang Yang. Secure and Efficient Authentication Protocol for Power System Computer Networks
345 -- 358Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang. Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model
359 -- 370Rui-Hong Dong, Dong-Fang Wu, Qiu-yu Zhang, Tao Zhang. Traffic Characteristic Map-based Intrusion Detection Model for Industrial Internet
371 -- 380Mohamed Rasslan, Ghada F. El-Kabbany, Heba Kamal Aslan. New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism
381 -- 389P. Kavitha, Rajeswari Mukesh. Detection of Impersonation Attack in MANET Using Polynomial Reduction Algorithm
390 -- 395Xueqin Zhang, Baoping Wang, Wei Wang. A New Remote Authentication Scheme for Anonymous Users Using Elliptic Curves Cryptosystem
396 -- 402Shin Yan Chiou, Wen-Tsai Ko, Erl-Huei Lu. A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application