Journal: I. J. Network Security

Volume 14, Issue 6

301 -- 309Li-Chin Huang, Lin Yu Tseng, Min-Shiang Hwang. The Study of Data Hiding in Medical Images
310 -- 315Miaomiao Tian, Liusheng Huang, Wei Yang. A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model
316 -- 319Kalyan Chakraborty, Jay Mehta. A Stamped Blind Signature Scheme based on Elliptic Curve Discrete Logarithm Problem
320 -- 323Miaomiao Tian, Liusheng Huang. Breaking A Proxy Signature Scheme From Lattices
324 -- 338Mishari Al Mishari, Emiliano De Cristofaro, Karim M. El Defrawy, Gene Tsudik. Harvesting SSL Certificate Data to Identify Web-Fraud
339 -- 351Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita. AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach
352 -- 361Farzaneh Geramiraz, Amir Saman Memaripour, Maghsoud Abbaspour. Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller
362 -- 365Miaomiao Tian, Wei Yang, Liusheng Huang. Security of a Biometric Identity-based Encryption Scheme

Volume 14, Issue 5

243 -- 250I-Wei Chen, Po-Ching Lin, Tsung-Huan Cheng, Chi-Chung Luo, Ying-Dar Lin, Yuan-Cheng Lai, Frank C. Lin. Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems
251 -- 256Xingwen Zhao. Amendment to Trace and Revoke Systems with Short Ciphertexts
257 -- 269N. Jeyanthi, N. Ch. Sriman Narayana Iyengar. An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks
270 -- 279Zhenhua Chen, Shundong Li, Chunzhi Wang, Yanping Shen. Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy
280 -- 288Ayman Mousa, Elsayed Nigm, El-Sayed El-Rabaie, Osama S. Faragallah. Query Processing Performance on Encrypted Databases by Using the REA Algorithm
289 -- 296Ashraf El-Sisi, Hamdy M. Mousa. Evaluation of Encryption Algorithms for Privacy Preserving Association Rules Mining
297 -- 300Jian-bin Hu, Hu Xiong, Zhong Chen. Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications

Volume 14, Issue 4

187 -- 205Arun Velagapalli, Mahalingam Ramkumar. Trustworthy TCB for DNS Servers
206 -- 210Behzad Malek, Ali Miri. Securing Harari's Authentication Scheme
211 -- 222Radhika Goel, Anjali Sardana, Ramesh C. Joshi. Parallel Misuse and Anomaly Detection Model
223 -- 228S. S. Sujatha, M. Mohamed Sathik. A Novel DWT Based Blind Watermarking for Image Authentication
229 -- 235Tzu-Chang Yeh, Jian-Ren Peng, Sheng-Shih Wang, Jun-Ping Hsu. Securing Bluetooth Communications
236 -- 242S. Maria Celestin Vigila, K. Muneeswaran. Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications

Volume 14, Issue 3

121 -- 141Kavitha Ammayappan, V. N. Sastry, Atul Negi. A New Secure Route Discovery Protocol for MANETs to Prevent Hidden Channel Attacks
142 -- 148Youliang Tian, Changgen Peng, Jianfeng Ma. Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings
149 -- 155Bimal Kumar Mishra, Gholam Mursalin Ansari. Differential Epidemic Model of Virus and Worms in Computer Network
156 -- 163Li Yang, Jian-Feng Ma, Qi Jiang. Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing
164 -- 172Kalpana Singh, Shefalika Ghosh Samaddar. Enhancing Koyama Scheme Using Selective Encryption Technique in RSA-based Singular Cubic Curve with AVK
173 -- 179Muhammad Naveed, Wasim Habib, Usman Masud, Ubaid Ullah, Gulzar Ahmad. Reliable and Low Cost RFID Based Authentication System for Large Scale Deployment
180 -- 186Rajaram Ramasamy, Amutha Prabakar Muniyandi. An Efficient Password Authentication Scheme for Smart Card

Volume 14, Issue 2

61 -- 70B. B. Gupta, Ramesh C. Joshi, Manoj Misra. ANN Based Scheme to Predict Number of Zombies in a DDoS Attack
71 -- 79Behzad Malek, Ali Miri. Adaptively Secure Broadcast Encryption with Short Ciphertexts
80 -- 85Navaneet Ojha, Sahadeo Padhye. Weak Keys in RSA over The Work of Blomer & May
86 -- 100Frank Zhu, Matt W. Mutka, Lionel M. Ni. Private Entity Authentication for Pervasive Computing Environments
101 -- 108Saikat Basu. A New Parallel Window-Based Implementation of the Elliptic Curve Point Multiplication in Multi-Core Architectures
109 -- 116Ping Dong, Huanyan Qian, Zhongjun Lu, Shaohua Lan. A Network Covert Channel Based on Packet Classification
117 -- 120Razi Arshad, Nassar Ikram. Cryptanalysis of a Non-interactive Deniable Authentication Protocol Based on Factoring

Volume 14, Issue 1

1 -- 21Ashok Kumar Das. Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks
22 -- 26Samaneh Mashhadi. A Novel Secure Self Proxy Signature Scheme
27 -- 32Addepalli V. N. Krishna. A New Non Linear Model Based Encryption Mechanism with Time Stamp and Acknowledgement Support
33 -- 38Zhiwei Wang, Licheng Wang, Shihui Zheng, Yixian Yang, Zhengming Hu. Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues
39 -- 46Sandeep K. Sood. An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol
47 -- 52Mustapha Hedabou. Efficient Countermeasure for Securing the Eta Pairing Computation over Binary Fields
53 -- 58Shuhua Wu, Qiong Pu. Comments on a Buyer-Seller Watermarking Protocol for Large Scale Networks
59 -- 60Martin Stanek. A Note on Security Protocol for Multicast Communications