Journal: I. J. Network Security

Volume 17, Issue 6

651 -- 660Doraipandian Manivannan, P. Neelamegam. An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks
661 -- 671Xingbing Fu, Shengke Zeng, Fagen Li. Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data
672 -- 677Chris Scheper, William J. J. Roberts. Anomaly Detection Using an MMPP-based GLRT
678 -- 682Qingfeng Cheng, Chunming Tang. Cryptanalysis of an ID-based Authenticated Dynamic Group Key Agreement with Optimal Round
683 -- 701Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita. Towards Generating Real-life Datasets for Network Intrusion Detection
702 -- 707Chin-Chen Chang, Jen-Ho Yang, Yu-Ching Wu. An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks
708 -- 711Yalin Chen, Jue-Sam Chou. On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking"
712 -- 721Tung-Huang Feng, Neng-Yih Shih, Min-Shiang Hwang. A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks
722 -- 727S. Maria Celestin Vigila, K. Muneeswaran. Hiding of Confidential Data in Spatial Domain Images using Image Interpolation
728 -- 735Ying Wang, Xinguang Peng. Cryptanalysis of Two Efficient Password-based Authentication Schemes Using Smart Cards
736 -- 742Namita Tiwari, Sahadeo Padhye. Provable Secure Multi-Proxy Signature Scheme without Bilinear Maps
743 -- 753Xu Ma, Jin Li 0002, Fangguo Zhang. Refereed Computation Delegation of Private Sequence Comparison in Cloud Computing
754 -- 770Ghazaleh Javadzadeh, Reza Azmi. IDuFG: Introducing an Intrusion Detection using Hybrid Fuzzy Genetic Approach
771 -- 778Brian King. A Dynamic Threshold Decryption Scheme Using Bilinear Pairings
779 -- 786Yang Zhao, Feng Yue, Songyang Wu, Hu Xiong, Zhiguang Qin. Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme
787 -- 794Jie Ling, Guangqiang Zhao. An Improved Anonymous Password Authentication Scheme Using Nonce and Bilinear Pairings
795 -- 802Yang Ming, YuMin Wang. On the Security of Three Public Auditing Schemes in Cloud Computing

Volume 17, Issue 5

497 -- 509Jia-Rong Sun, Mao-Lin Shih, Min-Shiang Hwang. A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure
510 -- 516Reddi Siva Ranjani, Dhavala Lalitha Bhaskari, Peri S. Avadhani. An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol
517 -- 521Tianwei Che, Jianfeng Ma, Na Li, Chao Wang. A Security Quantitative Analysis Method For Access Control Based on Security Entropy
522 -- 534Pijush Barthakur, Manoj Dahal, Mrinal Kanti Ghose. Adoption of a Fuzzy Based Classification Model for P2P Botnet Detection
535 -- 547Sana Qadir, Mohammad Umar Siddiqi, Wajdi F. M. Al-Khateeb. Analysing and Improving Performance and Security of Cryptographically Generated Address Algorithm for Mobile IPv6 Networks
548 -- 557Huixian Shi, Rui Guo. Provably-Secure Certificateless Key Encapsulation Mechanism for e-Healthcare System
558 -- 568Natarajan Mohananthini, Govindarajan Yamuna. A Study of DWT-SVD Based Multiple Watermarking Scheme for Medical Images
569 -- 579Erald Troja, Spiridon Bakiras. Leveraging P2P Interactions for Efficient Location Privacy in Database-driven Dynamic Spectrum Access
580 -- 587Jayaprakash Kar. Provably Secure Identity-based Aggregate Signcryption Scheme in Random Oracles
588 -- 596Vankamamidi Srinivasa Naresh, Nistala V. E. S. Murthy. Elliptic Curve Based Dynamic Contributory Group Key Agreement Protocol for Secure Group Communication over Ad-hoc Networks
597 -- 606Lin Cheng, Qiaoyan Wen. An Improved Certificateless Signcryption in the Standard Model
607 -- 618Chin-Feng Lee, Chin-Chen Chang, Pei-Yan Pai, Chia-Ming Liu. Adjustment Hiding Method Based on Exploiting Modification Direction
619 -- 628Xiujie Zhang, Chunxiang Xu. A Practical Forward-Secure Public-Key Encryption Scheme with Untrusted Update
629 -- 636Mohsen Toorani. Cryptanalysis of Two PAKE Protocols for Body Area Networks and Smart Environments
637 -- 642Huajun Huang, Shuang Pang, Qiong Deng, Jiaohua Qin. A Component Histogram Map Based Text Similarity Detection Algorithm
643 -- 649Shengyun Zhai, Fan Li, Chin-Chen Chang, Qian Mao. A Meaningful Scheme for Sharing Secret Images Using Mosaic Images

Volume 17, Issue 4

365 -- 382Maryam Tanha, Fazirulhisyam Hashim, Shamala Subramaniam. Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance
383 -- 394Rattikorn Hewett, Phongphun Kijsanayothin. Ranking Intrusion Likelihoods with Exploitability of Network Vulnerabilities in a Large-Scale Attack Model
395 -- 404Hai-Duong Le, Chin-Chen Chang, Yeh-Chieh Chou. A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET
405 -- 412Ashraf Aboshosha, Kamal A. ElDahshan, Eman K. Elsayed, Ahmed A. Elngar. EA Based Dynamic Key Generation in RC4 Ciphering Applied to CMS
413 -- 422Noureddine Chikouche, Cherif Foudil, Pierre-Louis Cayrel, Mohamed Benmohammed. Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem
423 -- 430Fangwei Wang, Yunkai Zhang, Yong Yang, Jianfang Ma. Global Analysis of a SEIQV Epidemic Model for Scanning Worms with Quarantine Strategy
431 -- 438Yi-Lun Chi, Cheng-Hao Chen, Iuon-Chang Lin, Min-Shiang Hwang. The Secure Transaction Protocol in NFC Card Emulation Mode
439 -- 444Yi-Hui Chen, Chih-Yang Lin, Wanutchaporn Sirakriengkrai, I.-Chun Weng. Repairable Image Authentication Scheme
445 -- 453Chenglian Liu, Chin-Chen Chang, Zhi-Pan Wu, Shi-Lin Ye. A Study of Relationship between RSA Public Key Cryptosystem and Goldbach's Conjecture Properties
454 -- 462Zhengjun Cao, Lihua Liu. Improvement of Green-Hohenberger Adaptive Oblivious Transfer: A Review
463 -- 470Yanli Ren, Shuozhong Wang, Xinpeng Zhang, Min-Shiang Hwang. An Efficient Batch Verifying Scheme for Detecting Illegal Signatures
471 -- 483Jie Wang, Xiao Yu, Ming Zhao. Fault-tolerant Verifiable Keyword Symmetric Searchable Encryption in Hybrid Cloud
484 -- 493Arindam Sarkar, Jyotsna Kumar Mandal. Cryptanalysis of Key Exchange method in Wireless Communication
494 -- 496Qingfeng Cheng. Security Analysis of a Pairing-free Identity-based Authenticated Group Key Agreement Protocol for Imbalanced Mobile Networks

Volume 17, Issue 3

229 -- 237Lin Cheng, Qiaoyan Wen. An Improved Certificateless Signcryption in the Standard Model
238 -- 242Yi-Hui Chen, Panyaporn Prangjarote, Chih-Yang Lin. Self-verifiable Secret Sharing Scheme with Locatability for Halftone Images
243 -- 254R. Padmavathy, Chakravarthy Bhagvati. A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery
255 -- 263Qinyi Li, Fengli Zhang. A Fully Secure Attribute Based Broadcast Encryption Scheme
264 -- 281Muhammad Mahmoud, Manjinder Nir, Ashraf Matrawy. A Survey on Botnet Architectures, Detection and Defences
282 -- 289Ci-Lin Li, Chih-Yang Lin, Tzung-Her Chen. Efficient Compression-Jointed Quality Controllable Scrambling Method for H.264/SVC

Volume 17, Issue 2

103 -- 109Zhengjun Cao, Hanyue Cao. Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme
110 -- 122Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi. Revocable Identity-based Signcryption Scheme Without Random Oracles
123 -- 128Bin Feng, Cheng Guo, MingChu Li, Zhi-Hui Wang. A Novel Proactive Multi-secret Sharing Scheme
129 -- 134Ji Geng, Hu Xiong, Zhiguang Qin, Fagen Li. On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing
135 -- 141Yuan Huang, Shengke Zeng, Xingwei Liu. Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature
142 -- 149Xingbing Fu. Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes
150 -- 159Patrick G. Clark, Arvin Agah. Firewall Policy Diagram: Structures for Firewall Behavior Comprehension
160 -- 164Heri Wijayanto, Min-Shiang Hwang. Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance
165 -- 173Cheng Guo, Chin-Chen Chang. A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem
174 -- 188Shengyi Pan, Thomas H. Morris, Uttam Adhikari. A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System
189 -- 198Jan-Min Chen. An Auto-tuning Sanitizing System for Mitigating Injection Flaws
199 -- 207Feng Wang, Chin-Chen Chang, Yeh-Chieh Chou. Group Authentication and Group Key Distribution for Ad Hoc Networks
208 -- 216Degang Xu, Zhao Wu, Zhongbo Wu, Qilin Zhang, Leihua Qin, Jingli Zhou. Internet of Things: Hotspot-based Discovery Service Architecture with Security Mechanism
217 -- 223Yi Zhao, Qiliang Yang, Bo Yang. Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue
224 -- 228Hu Xiong, Ji Geng, Zhiguang Qin, Guobin Zhu. Cryptanalysis of Attribute-based Ring Signcryption Scheme

Volume 17, Issue 1

1 -- 6Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li. Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol
7 -- 22Hoseb Dermanilian, Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab. Energy-Efficient Security for Voice over IP
23 -- 28Changlu Lin, Yong Li 0002, Kewei Lv, Chin-Chen Chang. Ciphertext-Auditable Identity-Based Encryption
29 -- 33Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, Mingwu Zhang. Notes on Proxy Signcryption and Multi-proxy Signature Schemes
34 -- 39Mikio Fujiwara, Tomoyasu Domeki, Shiho Moriai, Masahide Sasaki. Highly Secure Network Switches with Quantum Key Distribution Systems
40 -- 48Hui-Feng Huang, Pin-Han Lin, Min-Hsuan Tsai. Convertible Multi-authenticated Encryption Scheme for Data Communication
49 -- 56Nashrul Hakiem, Mohammad Umar Siddiqi, Hashum Mohamed Rafiq. Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network
57 -- 65Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar. Semi Random Position Based Steganography for Resisting Statistical Steganalysis
66 -- 71Hasmukh Patel, Devesh C. Jinwala. Automated Analysis of Internet Key Exchange Protocol v2 for Denial of Service Attacks
72 -- 78Felipe dos Anjos Lima, Edward David Moreno, Dellano Oliveira D. dos Santos, Wanderson Roger Azevedo Dias. Energy Characterization of a Security Module in ARM Processor
79 -- 84Yuan-Yu Tsai, Wen-Ching Huang, Bo-Feng Peng. An Efficient and Distortion-controllable Information Hiding Algorithm for 3D Polygonal Models with Adaptation
85 -- 93Boqing Xu, Qun Xiao, Zhenxing Qian, Chuan Qin. Unequal Protection Mechanism for Digital Speech Transmission Based on Turbo Codes
94 -- 102Yongtao Wang, Xiaonan Liu, Lulu Liang, Weiduan Feng, Guang Yang. Mitigating Key Escrow in Attribute-Based Encryption