Journal: I. J. Network Security

Volume 18, Issue 6

1001 -- 1009Hongfeng Zhu. Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving
1010 -- 1021Chin-Chen Chang, Wei-Yuan Hsueh, Ting-Fang Cheng. An Advanced Anonymous and Biometrics-based Multi-server Authentication Scheme Using Smart Cards
1022 -- 1033Ming-Ru Xie, Chia Chun Wu, Jau-Ji Shen, Min-Shiang Hwang. A Survey of Data Distortion Watermarking Relational Databases
1034 -- 1040Nurhashikin Mohd Salleh, Siti Rahayu Selamat, Robiah Yusof, Shahrin Sahib. Discovering Cyber Terrorism Using Trace Pattern
1041 -- 1053Hiten Choudhury, Basav Roychoudhury, Dilip Kr. Saikia. Security Extension for Relaxed Trust Requirement in Non3GPP Access to the EPS
1054 -- 1059Zhengjun Cao, Lihua Liu, Olivier Markowitch. On Two Kinds of Flaws in Some Server-Aided Verification Schemes
1060 -- 1070Trung Ngo Thanh, Tae-Young Choe. A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key
1071 -- 1079Xiuxia Tian, Lisha Li, Jinguo Li, Hongjiao Li, Chunhua Gu. Secret Share Based Program Access Authorization Protocol for Smart Metering
1080 -- 1088Ashraf Aboshosha, Kamal A. ElDahshan, Eman K. Elsayed, Ahmed A. Elngar. Secure Authentication Protocol Based on Machine-metrics and RC4-EA Hashing
1089 -- 1101Maged Hamada Ibrahim. Octopus: An Edge-fog Mutual Authentication Scheme
1102 -- 1108Jiaohua Qin, Ruxin Sun, Xuyu Xiang, Hao Li, Huajun Huang. Anti-fake Digital Watermarking Algorithm Based on QR Codes and DWT
1109 -- 1121Zheng Yang, Chao Liu, Wanping Liu, Song Luo, Hua Long, Shuangqing Li. A Lightweight Generic Compiler for Authenticated Key Exchange from Non-interactive Key Exchange with Auxiliary Input
1122 -- 1129Junlan Bai, Chin-Chen Chang. A High Payload Steganographic Scheme for Compressed Images with Hamming Code
1130 -- 1142Warakorn Srichavengsup, Wimol San-Um. Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security
1143 -- 1151Ya Gao, Peng Zeng, Kim-Kwang Raymond Choo, Fu Song. An Improved Online/Offline Identity-Based Signature Scheme for WSNs
1152 -- 1158Lamri Loauamer, Omar Tayan. An Efficient and Robust Hybrid Watermarking Scheme for Text-Images
1159 -- 1172Qais Qassim, Abdullah Mohd Zin, Mohd Juzaiddin Ab Aziz. Anomalies Classification Approach for Network-based Intrusion Detection System
1173 -- 1179Peng-yu Cui. An Improved Ownership Transfer and Mutual Authentication for Lightweight RFID Protocols
1180 -- 1191Ouissem Ben Fredj. An Automatic Alert Unification Method for Heterogeneous Alert Signatures
1192 -- 1200Qiao Peng, Youliang Tian. A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption

Volume 18, Issue 5

803 -- 815Hongfeng Zhu, Yifeng Zhang, Yang Sun. Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography
816 -- 831Qing-Qing Xie, Shunrong Jiang, Liangmin Wang, Chin-Chen Chang. Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks
832 -- 841Dharmalingam Vaishnavi, T. S. Subashini. A Secure and Robust Image Watermarking System Using Normalization and Arnold Scrambling
842 -- 854Yosra Ben Saied, Alexis Olivereau. A Lightweight Threat Detection System for Industrial Wireless Sensor Networks
855 -- 860Amar Buchade, Rajesh Ingle. Key Trees Combining Algorithm for Overlapping Resource Access Members
861 -- 873Anirban Goswami, Nabin Ghoshal. Imperceptible Image Authentication Using Wavelets
874 -- 881Dileep Kumar Pattipati, Appala Naidu Tentu, V. Ch. Venkaiah, Allam Appa Rao. Sequential Secret Sharing Scheme Based on Level Ordered Access Structure
882 -- 887Hui Xiao, Hongbin Wang, Meitong Lin. The Research on File Encryption Method Based on File Content Partitioning Restructuring
888 -- 899Osman Wahballa, Abubaker Wahaballa, Fagen Li, Chunxiang Xu. A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT
900 -- 916Chi-Wei Liu, Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang. A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage
917 -- 925Zhenhua Chen, Shundong Li, Qiong Huang, Jianhua Yan, Yong Ding. A Joint Random Secret Sharing Scheme with Public Verifiability
926 -- 937Parimalla Subhash, S. Ramachandram. Trust Based HWMP Protocol in High-Performance Wireless Mesh Networks
938 -- 945Mohammed Hassouna, Eihab Bashier, Bazara I. A. Barry. A Strongly Secure Certificateless Digital Signature Scheme in the Random Oracle Model
946 -- 959Depeng Li, Srinivas Sampalli. Group Rekeying Scheme for Dynamic Peer Group Security in Collaborative Networks
960 -- 968Rang Zhou, Chunxiang Xu, Wanpeng Li, Jining Zhao. An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter
969 -- 977Murari Mandal, Gaurav Sharma 0006, Anil K. Verma. A Computational Review of Identity-based Signcryption Schemes
978 -- 986Amar Buchade, Rajesh Ingle. Analysis of Algorithms for Overlapping Resource Access Members in Cloud Computing
987 -- 992Shaoquan Jiang, Zailiang Tang, Mingsheng Wang. On the CLD Attack to a Statistical Model of a Key Stream Generator
993 -- 996Yan Xu, Liusheng Huang, Miaomiao Tian, Hong Zhong. Insecurity of a Certificate-free Ad Hoc Anonymous Authentication
997 -- 1000Yanjun Liu, Chin-Chen Chang, Chin-Yu Sun. Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics"

Volume 18, Issue 4

601 -- 616Ahmed Asimi, Younes Asimi, Amghar Abdellah, Yassine Sadqi. Strong Zero-knowledge Authentication Based on Virtual Passwords
617 -- 624Yanjun Liu, Chin-Chen Chang. An Integratable Verifiable Secret Sharing Mechanism
625 -- 632Solomon Sarpong, Chunxiang Xu, Xiaojun Zhang. PPAM: Privacy-preserving Attributes Matchmaking Protocol for Mobile Social Networks Secure against Malicious Users
633 -- 643Biswapati Jana, Debasis Giri, Shyamal Kumar Mondal. Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion
644 -- 649Kai-Hao Chen, Xiaoming Tang, Peng Xu, Man Guo, Weidong Qiu, Zheng Gong. An Improved Automatic Search Method for Differential Trails in TEA Cipher
650 -- 666Chi-Wei Liu, Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang. A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing
667 -- 677Christopher W. Badenhop, Benjamin W. P. Ramsey, Barry E. Mullins. An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols
678 -- 687A. Prakash, R. Dhanalakshmi. Stride Towards Proposing Multi-Modal Biometric Authentication for Online Exam
688 -- 698Hongfeng Zhu, Yifeng Zhang, Yan Zhang. A Provably Password Authenticated Key Exchange Scheme Based on Chaotic Maps in Different Realm
699 -- 709Dinesh Singh, Dhiren Patel, Bhavesh Borisaniya, Chirag Modi. Collaborative IDS Framework for Cloud
710 -- 717Lein Harn, Feng Wang. Threshold Signature Scheme without Using Polynomial Interpolation
718 -- 727Shun Zhang, Tiegang Gao, Liang Yang. A Reversible Data Hiding Scheme Based on Histogram Modification in Integer DWT Domain for BTC Compressed Images
728 -- 735Fuh-Gwo Jeng, Jyun-Ci Huang, Tzung-Her Chen. An Improved Anonymous Buyer-Reseller Watermarking Protocol
736 -- 749Bhawani Shanker Bhati, Pallapa Venkataram. Performance Analysis of Location Privacy Preserving Scheme for MANETs
750 -- 757K. Bharanitharan, Chin-Chen Chang, Yang Hai Rui, Zhi-Hui Wang. Efficient Pixel Prediction Algorithm for Reversible Data Hiding
758 -- 768Krishna Bhowal, Debasree Sarkar, Sushanta Biswas, Partha Pratim Sarkar. Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions
769 -- 781Mohammed Ramadan, Fagen Li, Chunxiang Xu, Abdeldime Mohamed, Hisham Abdalla, Ahmed Abdalla. User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System
782 -- 792Jianghong Wei, Wenfen Liu, Xuexian Hu. Secure and Efficient Smart Card Based Remote User Password Authentication Scheme
793 -- 797Chih-Cheng Chen, Hanmin Chien, Gwoboa Horng. Cryptanalysis of a Compact Certificateless Aggregate Signature Scheme
798 -- 801Martin Stanek. Weaknesses of Password Authentication Scheme Based on Geometric Hashing

Volume 18, Issue 3

401 -- 409Hongfeng Zhu, Yan Zhang, Xiaodan Wang. A Novel One-Time Identity-Password Authenticated Scheme Based on Biometrics for E-coupon System
410 -- 419Fan Li, Qian Mao, Chin-Chen Chang. A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method
420 -- 432Mehdi Hosseinzadeh Aghdam, Peyman Kabiri. Feature Selection for Intrusion Detection System Using Ant Colony Optimization
433 -- 444Suchart Khummanee, Kitt Tientanopajai. The Policy Mapping Algorithm for High-speed Firewall Policy Verifying
445 -- 453Younes Asimi, Abdallah Amghar, Ahmed Asimi, Yassine Sadqi. New Random Generator of a Safe Cryptographic Salt Per Session
454 -- 458Feng Wang, Chin-Chen Chang, Changlu Lin. Security Analysis on Secure Untraceable Off-line Electronic Cash System
459 -- 473Anthéa Mayzaud, Remi Badonnel, Isabelle Chrisment. A Taxonomy of Attacks in RPL-based Internet of Things
474 -- 480Arindom Ain, Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita. Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation
481 -- 486Yilei Wang, Wenyi Bao, Yang Zhao, Hu Xiong, Zhiguang Qin. An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment
487 -- 492Chenhuang Wu, Xiaoni Du, Zhengtao Jiang. Linear Complexity of a Family of Pseudorandom Discrete Logarithm Threshold Sequences
493 -- 500Fangwei Wang, Fang Yang, Changguang Wang, Dongmei Zhao, Yunkai Zhang. Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination
501 -- 513Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdullah, Mohammed AlQurashi, Rahmat Budiarto. Penetration Testing and Mitigation of Vulnerabilities Windows Server
514 -- 522Alka Chauhary, V. N. Tiwari, Anil Kumar Dahiya. A Novel Intrusion Detection System Based on Soft Computing Techniques Using Neuro- Fuzzy Classifier for Packet Dropping Attack in MANETs
523 -- 528Ali Kartit, Hamza Kamal Idrissi, Mohamed Belkhouraf. Improved Methods and Principles for Designing and Analyzing Security Protocols
529 -- 537Mohamad Badra, Sherali Zeadally. An Improved Privacy Solution for the Smart Grid
538 -- 543Zhengjun Cao, Lihua Liu, Zhenzhen Yan. An Improved Lindell-Waisbard Private Web Search Scheme
544 -- 552Xing Zhang, Rongxing Lu, Hong Zhang, Chungen Xu. A New Digital Signature Scheme from Layered Cellular Automata
553 -- 564Tanmoy Maitra, Ruhul Amin, Debasis Giri, P. D. Srivastava. An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card
565 -- 578Chien-Cheng Huang, Kwo-Jean Farn. A Study on E-Taiwan Promotion Information Security Governance Programs with E-government Implementation of Information Security Management Standardization
579 -- 589Govand Kadir, Torben Kuseler, Ihsan Alshahib Lami. SMPR: A Smartphone Based MANET Using Prime Numbers to Enhance the Network-nodes Reachability and Security of Routing Protocols
590 -- 593Chung-Huei Ling, Shih-Ming Chen, Min-Shiang Hwang. Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
594 -- 596Chin-Yu Sun, Ching-Chun Chang. Cryptanalysis of a Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems
597 -- 600Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Wang, Tzung-Her Chen. On the Security of Privacy-preserving Keyword Searching for Cloud Storage Services

Volume 18, Issue 2

201 -- 208Chin-Chen Chang, Chin-Yu Sun, Shih-Chang Chang. A Strong RSA-based and Certificateless-based Signature Scheme
209 -- 216Hongfeng Zhu, Yan Zhang, Haiyang Li, Lin Lin. A Novel Biometrics-based One-Time Commitment Authenticated Key Agreement Scheme with Privacy Protection for Mobile Network
217 -- 223Dianli Guo, Fengtong Wen. A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC
224 -- 234Samant Saurabh, Ashok Singh Sairam. Increasing Accuracy and Reliability of IP Traceback for DDoS Attack Using Completion Condition
235 -- 243Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Philip Avornyo, Zhiguang Qin. Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System
244 -- 249Xiao Ma, Tongjiang Yan, Daode Zhang, Yanyan Liu. Linear Complexity of Some Binary Interleaved Sequences of Period 4N
250 -- 262Azz El Arab El Hossaini, Mohamed El Aroussi, Khadija Jamali, Samir Mbarki, Mohammed Wahbi. A New Robust Blind Copyright Protection Scheme Based on Visual Cryptography and Steerable Pyramid
263 -- 273Abhimanyu Kumar, Sachin Tripathi. Anonymous ID-based Group Key Agreement Protocol without Pairing
274 -- 282Da-Chun Wu, Ming-Yao Chen. Information Hiding in Standard MIDI Files Based on Velocity Reference Values
283 -- 290Jun Ye, Haiyan Zhang, Changyou Fu. Verifiable Delegation of Polynomials
291 -- 303E. Suresh Babu, C. Naga Raju, Munaga H. M. Krishna Prasad. Inspired Pseudo Biotic DNA Based Cryptographic Mechanism Against Adaptive Cryptographic Attacks
304 -- 315Zheng Yang, Daigu Zhang. Towards Modelling Perfect Forward Secrecy for One-round Group Key Exchange
316 -- 325Miroslav Stampar. Inferential SQL Injection Attacks
326 -- 334Hongfeng Zhu, Yifeng Zhang, Yu Xia, Haiyang Li. Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model
335 -- 344Hai-Duong Le, Ngoc-Tu Nguyen, Chin-Chen Chang. Provably Secure and Efficient Three-Factor Authenticated Key Agreement Scheme with Untraceability
345 -- 353Said Bouchkaren, Saiida Lazaar. A New Iterative Secret Key Cryptosystem Based on Reversible and Irreversible Cellular Automata
354 -- 361Quan Qian, Yan-Long Jia, Rui Zhang. A Lightweight RFID Security Protocol Based on Elliptic Curve Crytography
362 -- 368Prasanth Kumar Thandra, J. Rajan, S. A. V. Satya Murty. Cryptanalysis of an Efficient Passwortd Authentication Scheme
369 -- 373Nikolay Andreevich Moldovyan, Alexander Andreevich Moldovyan, Andrey Nikolaevich Berezin. On Using Mersenne Primes in Designing Cryptoschemes
374 -- 382Yimin Wang, Hong Zhong, Yan Xu, Jie Cui. ECPB: Efficient Conditional Privacy-Preserving Authentication Scheme Supporting Batch Verification for VANETs
383 -- 392Kailas Patil, Braun Frederik. A Measurement Study of the Content Security Policy on Real-World Applications
393 -- 396Fushan Wei, Yun Wei, Chuangui Ma. Attack on An ID-based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
397 -- 400Chung-Huei Ling, Wei-Fu Hsien, Min-Shiang Hwang. A Double Circular Chain Intrusion Detection for Cloud Computing Based on AdjointVM Approach

Volume 18, Issue 1

1 -- 18Adarsh Kumar, Krishna Gopal, Alok Aggarwal. Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs
19 -- 32Dhekra Essaidani, Hassene Seddik, Ezzedine Ben Braiek. Asynchronous Invariant Digital Image Watermarking in Radon Field for Resistant Encrypted Watermark
33 -- 42Ziba Eslami, Mahnaz Noroozi, Saideh Kabiri Rad. Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders
43 -- 51Zhiyong Zhang, Lijun Yang, Hanman Li, Fei Xiang. A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks
52 -- 59Zhi-Hui Wang, Xu Zhuang, Chin-Chen Chang, Chuan Qin, Yan Zhu 0001. Reversible Data Hiding Based on Geometric Structure of Pixel Groups
60 -- 67Shuaiting Qiao, Wenbao Han, Yifa Li, Luyao Jiao. Construction of Extended Multivariate Public Key Cryptosystems
68 -- 81Prabir Kumar Naskar, Hari Narayan Khan, Atal Chaudhuri. A Key Based Secure Threshold Cryptography for Secret Image
82 -- 89Gaurav Sharma, Suman Bala, Anil K. Verma. An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks
90 -- 98Feng Wang, Chin-Chen Chang, Changlu Lin, Shih-Chang Chang. Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues
99 -- 107Suresh Kumar Balakrishnan, V. P. Jagathy Raj. Practical Implementation of a Secure Email System Using Certificateless Cryptography and Domain Name System
108 -- 115Chao-Liang Liu, Gwoboa Horng, Du-shiau Tsai. Speeding up Pairing Computation Using Non-adjacent Form and ELM Method
116 -- 123Hongfeng Zhu, Yifeng Zhang, Yan Zhang, Haiyang Li. A Novel and Provable Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps towards Mobile Network
124 -- 132Seyyed Amin Seyyedi, Vasili Sadau, Nick Ivanov. A Secure Steganography Method Based on Integer Lifting Wavelet Transform
133 -- 142Wei-Fu Hsien, Chou Chen Yang, Min-Shiang Hwang. A Survey of Public Auditing for Secure Data Storage in Cloud Computing
143 -- 150Harini Narasimhan, T. R. Padmanabhan. 3CAuth - A Novel Multi-Factor Authentication Scheme Using QR-Code
151 -- 157Normahirah Nek Abd Rahman, Muhammad Rezal Kamel Ariffin. The Development of Deniable Authentication Protocol Based on The Bivariate Function Hard Problem
158 -- 164Xuyun Nie, Chuanyong Hou, Zhaohu Xu, Gang Lu. Analysis of Second Order Matrices Construction in MFE Public Key Cryptosystem
165 -- 171Yang Ming, YuMin Wang. Cryptanalysis of an Identity Based Signcryption Scheme in the Standard Model
172 -- 181Ruhul Amin. Cryptanalysis and Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-server Environment Using Smart Card
182 -- 192Quan Qian, Jing Cai, Mengbo Xie, Rui Zhang. Malicious Behavior Monitoring for Android Applications
193 -- 200Guangsong Li, Qi Jiang, Yanan Shi, Fushan Wei. Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks