Journal: I. J. Network Security

Volume 16, Issue 6

400 -- 410Wei Teng Li, Chung-Huei Ling, Min-Shiang Hwang. Group Rekeying in Wireless Sensor Networks: A Survey
411 -- 419Xi Chen, Yun Liu, Chin-Chen Chang, Cheng Guo. Generalized Secret Sharing with Linear Hierarchical Secrets
420 -- 425Lein Harn, Fuyou Miao. Weighted Secret Sharing Based on the Chinese Remainder Theorem
426 -- 436Yesem Kurt Peker. A New Key Agreement Scheme Based on the Triple Decomposition Problem
437 -- 443Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Guangjun Liu. Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data
444 -- 451Yongtao Wang. Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model
452 -- 462mamta juneja, Parvinder Singh Sandhu. Improved LSB based Steganography Techniques for Color Images in Spatial Domain
463 -- 467Hui-Feng Huang, Hong-Wei Chang, Po-Kai Yu. Enhancement of Timestamp-based User Authentication Scheme with Smart Card
468 -- 476CaLynna Sorrells, Lijun Qian. Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks
477 -- 486Ying-Dar Lin, Yi-Ta Chiang, Yu-Sung Wu, Yuan-Cheng Lai. Automatic Analysis and Classification of Obfuscated Bot Binaries
487 -- 493Zhi-Hui Wang, Haibo Jin, Xuebo Wang, Chin-Chen Chang. An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation
494 -- 497Qingfeng Cheng. Cryptanalysis of a New Efficient Authenticated Multiple-Key Exchange Protocol from Bilinear Pairings
498 -- 500Miaomiao Tian, Youwen Zhu, Zhili Chen. Two Simple Attacks on a Blind Signature Scheme

Volume 16, Issue 5

323 -- 330Wei Teng Li, Tung-Huang Feng, Min-Shiang Hwang. Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey
331 -- 339Shengke Zeng, Hu Xiong. Privacy-enhanced Designated Confirmer Signature without Random Oracles
340 -- 354Safwan Mahmud Khan, Kevin W. Hamlen. Penny: Secure, Decentralized Data Management
355 -- 362Jianhong Zhang, Min Xu, Liying Liu. On the Security of a Secure Batch Verification with Group Testing for VANET
363 -- 368Yuan-Yu Tsai, Jian-Ting Chen, Chi-Shiang Chan. Exploring LSB Substitution and Pixel-value Differencing for Block-based Adaptive Data Hiding
369 -- 375Walid Khedr. On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags
376 -- 381Maha S. Abdelhaq, Raed A. Alsaqour, Mohammed Al-Hubaishi, Tariq Alahdal, Mueen Uddin. The Impact of Resource Consumption Attack on Mobile Ad-hoc Network Routing
382 -- 388Jie Wang, Yanshuo Yu, Kuanjiu Zhou. A Regular Expression Matching Approach to Distributed Wireless Network Security System
389 -- 392Chi-hsien Lin, K. Bharanitharan, Chin-Chen Chang. Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System
393 -- 396Debiao He, Yuanyuan Zhang, Jianhua Chen. Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol
397 -- 400Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang. Comments on FHH Anonymous Multireceiver Encryption

Volume 16, Issue 4

237 -- 243Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu. A Simple Password Authentication Scheme Based on Geometric Hashing Function
244 -- 251Zhiguang Qin, Hu Xiong, Fagen Li. A Provably Secure Certificate Based Ring Signature Without Pairing
249 -- 255Y. V. Subba Rao, Chakravarthy Bhagvati. CRT Based Threshold Multi Secret Sharing Scheme
252 -- 260Keying Li, Hua Ma. Outsourcing Decryption of Multi-Authority ABE Ciphertexts
256 -- 264Yanli Ren, Zhihua Niu, Xinpeng Zhang. Fully Anonymous Identity-based Broadcast Encryption without Random Oracles
261 -- 269Shengke Zeng, Hu Xiong. Privacy-enhanced Designated Confirmer Signature without Random Oracles
265 -- 270Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, Ahmed S. Sakr. A Steganographic Method Based on DCT, New Quantization Technique
270 -- 272Miaomiao Tian, Youwen Zhu, Zhili Chen. Two Simple Attacks on a Blind Signature Scheme
271 -- 277Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu 0001. A Simple Password Authentication Scheme Based on Geometric Hashing Function
273 -- 276Chi-hsien Lin, K. Bharanitharan, Chin-Chen Chang. Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System
277 -- 280Qingfeng Cheng. Cryptanalysis of a New Efficient Authenticated Multiple-Key Exchange Protocol from Bilinear Pairings
281 -- 284Debiao He, Yuanyuan Zhang, Jianhua Chen. Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol
285 -- 288Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang. Comments on FHH Anonymous Multireceiver Encryption
289 -- 303Safwan Mahmud Khan, Kevin W. Hamlen. Penny: Secure, Decentralized Data Management
304 -- 312Qian Mao, Chin-Chen Chang, Ting-Feng Chung. A Reversible Steganography Suitable for Embedding Small Amounts of Data
304 -- 312Boris Mihajlov, Mitko Bogdanoski. Analysis of the WSN MAC Protocols under Jamming DoS Attack
313 -- 320Jianhong Zhang, Min Xu, Liying Liu. On the Security of a Secure Batch Verification with Group Testing for VANET
313 -- 317Chi-Shiang Chan, Yi-Hui Chen, Yuan-Yu Tsai. An Improvement of Square Matrix Encoding by Adjusting Digits in a Matrix
318 -- 321Tung-Huang Feng, Chung-Huei Ling, Min-Shiang Hwang. Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments
321 -- 332Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang. Robust Two-Factor Authentication and Key Agreement Preserving User Privacy
333 -- 339Walid Khedr. On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags
340 -- 350Yesem Kurt Peker. A New Key Agreement Scheme Based on the Triple Decomposition Problem
351 -- 357Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Guangjun Liu. Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data
358 -- 365Yongtao Wang. Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model
366 -- 376mamta juneja, Parvinder Singh Sandhu. Improved LSB based Steganography Techniques for Color Images in Spatial Domain
377 -- 384Chien-Cheng Huang, Kwo-Jean Farn, Frank Yeong-Sung Lin. A Study on Implementations of Information Security Risk Assessment: Application to Chlorine Processing System of Water Treatment
385 -- 389Hui-Feng Huang, Hong-Wei Chang, Po-Kai Yu. Enhancement of Timestamp-based User Authentication Scheme with Smart Card

Volume 16, Issue 3

168 -- 178Rakesh Matam, Somanath Tripathy. Provably Secure Routing Protocol for Wireless Mesh Networks
179 -- 184Satyajit Das, Jaydeb Bhaumik. A Fault Based Attack on MDS-AES
185 -- 193Yunqi Dou, Jiang Weng, Yun Wei, Chuangui Ma. Fault Attack Against Miller's Algorithm for Even Embedding Degree
194 -- 200Subba Rao Y. V., Chakravarthy Bhagvati. CRT based Threshold Multi Secret Sharing scheme
201 -- 213Chin-Chen Chang, Thai Son Nguyen, Chia-Chen Lin. Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity
214 -- 219Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, Ahmed S. Sakr. A Steganographic Method Based on DCT and New Quantization Technique
220 -- 228Xi Chen, Yun Liu, Chin-Chen Chang, Cheng Guo. Generalized Secret Sharing with Linear Hierarchical Secrets
229 -- 236Boqing Zhou, Sujun Li, Jianxin Wang, Siqing Yang, Jingguo Dai. A Pairwise Key Establishment Scheme for Multiple Deployment Sensor Networks

Volume 16, Issue 2

90 -- 101Tarek M. I. El-Sakka, M. Zaki. Using Predicate-based Model Checker for Verifying E-Commerce Protocols
102 -- 111Poonam Gera, Kumkum Garg, Manoj Misra. Trust-based Multi-Path Routing for Enhancing Data Security in MANETs
112 -- 117Abderrahmane Nitaj. Cryptanalysis of NTRU with two Public Keys
118 -- 128Mohammad Esmaeildoust, Keivan Navi, Shirin Rezaei, Marzieh Gerami. On the Design of RNS Bases for Modular Multiplication
129 -- 142Yuan Wang, Duncan S. Wong, Liusheng Huang. One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity
143 -- 148Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari. A Pairing-free ID-based Key Agreement Protocol with Different PKGs
149 -- 156Benamar Kadri, Mohammed Feham, Abdellah Mhammed. Efficient and Secured Ant Routing Algorithm for Wireless Sensor Networks
157 -- 164Min Zhou, Mingwu Zhang, Chunzhi Wang, Bo Yang 0003. CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction

Volume 16, Issue 1

1 -- 13Pei-Shan Chung, Chi-Wei Liu, Min-Shiang Hwang. A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments
14 -- 18B. Karthikeyan, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti, M. Gomathymeenakshi. An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image
19 -- 28Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai. Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
29 -- 39Jayaprakash Kar. Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network
40 -- 45Jian-Guo Sun, Guo-Yin Zhang, Ai-Hong Yao, Jun-Peng Wu. A Reversible Digital Watermarking Algorithm for Vector Maps
46 -- 52Soniya Balram, M. Wilscy. User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection
53 -- 57Navaneet Ojha, Sahadeo Padhye. Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key
58 -- 64Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang. An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem
65 -- 70A. Prakash, Rajeswari Mukesh. A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits
71 -- 77Yunqi Dou, Jiang Weng, Chuangui Ma. Improved Fault Attack Against Eta Pairing
78 -- 80Debiao He, Muhammad Khurram Khan, Shuhua Wu. On the Security of a RSA-based Certificateless Signature Scheme