Journal: I. J. Network Security

Volume 20, Issue 4

601 -- 608Arun Malik, Babita Pandey. Security Analysis of Discrete Event Based Threat Driven Authentication Approach in VANET Using Petri Nets
609 -- 616Bei Xie, Jiaohua Qin, Xuyu Xiang, Hao Li, Lili Pan. An Image Retrieval Algorithm Based on Gist and Sift Features
617 -- 624Chitra Rajarama, Jagadeesha Narasimhamurthy Sugatoor, T. Yerri Swamy. Diffie-Hellman Type Key Exchange, ElGamal Like Encryption/Decryption and Proxy Re-encryption Using Circulant Matrices
625 -- 635Dindayal Mahto, Dilip Kumar Yadav. Performance Analysis of RSA and Elliptic Curve Cryptography
636 -- 644Mourad Abdeljebbar, Rachid El Kouch. Security Improvements of EPS-AKA Protocol
645 -- 654Yasir Hamid, Veeran Ranganathan Balasaraswathi, Ludovic Journaux, Muthukumarasamy Sugumaran. Benchmark Datasets for Network Intrusion Detection: A Review
655 -- 663Fadi Al-Ayed, Chunqiang Hu, Hang Liu. An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions
664 -- 673Ming Yang, Rong Jiang, Tilei Gao, Wanyu Xie, Jia Wang. Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain
674 -- 682Xu Wu. Study on Trust Model for Multi-users in Cloud Computing
683 -- 688Zhengjun Cao, Chong Mao, Lihua Liu, Wenping Kong, Jinbo Wang. Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
689 -- 701Divyashikha Sethia, Huzur Saran, Daya Gupta. CP-ABE for Selective Access with Scalable Revocation: A Case Study for Mobile-based Healthfolder
702 -- 709Prakash G. L, Manish Prateek, Inder Singh. Data Verification Using Block Level Batch Auditing on Multi-cloud Server
710 -- 720Tao Feng, Jiaqi Guo. A New Access Control System Based on CP-ABE in Named Data Networking
721 -- 729Shaila Ghanti, G. M. Naik. Defense Techniques of SYN Flood Attack Characterization and Comparisons
730 -- 737K. Murugan, P. Suresh. Efficient Anomaly Intrusion Detection Using Hybrid Probabilistic Techniques in Wireless Ad Hoc Network
738 -- 745K. Veena, K. Meena. Identification of Cyber Criminal by Analysing the Users Profile
746 -- 753V. S. Janani, M. S. K. Manikandan. An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks
754 -- 761Yunfa Li, Yangyang Shen, Mingyi Li. A Credible Mechanism of Service about Data Resource in Cloud Computing
762 -- 773Ke Gu, Linyu Wang, Na Wu, Niandong Liao. Traceable Certificateless Ring Signature Scheme For No Full Anonymous Applications
774 -- 787Kazi Md. Rokibul Alam, Adnan Maruf, Md. Rezaur Rahman Rakib, G. G. Md. Nawaz Ali, Peter Han Joo Chong, Yasuhiko Morimoto. An Untraceable Voting Scheme Based on Pairs of Signatures
788 -- 800Youssef Harmouch, Rachid Elkouch, Hussain Ben-Azza. Multiple New Formulas for Cipher Performance Computing
801 -- 804Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang. A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching
805 -- 810Cen Zuo. Defense of Computer Network Viruses Based on Data Mining Technology