Journal: I. J. Network Security

Volume 19, Issue 6

863 -- 869Jong-Shin Chen, Cheng-Ying Yang, Min-Shiang Hwang. The Capacity Analysis in the Secure Cooperative Communication System
870 -- 879Mourade Azrour, Yousef Farhaoui, Mohammed Ouanan. A New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card
880 -- 888Rui-Hong Dong, Dong-Fang Wu, Qiu-yu Zhang. The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set
889 -- 898Zakariae Tbatou, Ahmed Asimi, Younes Asimi, Yassine Sadqi, Azidine Guezzaz. A New Mutuel Kerberos Authentication Protocol for Distributed Systems
899 -- 903Yuwei Xu, Chuankun Wu. Further Characterization of H Vectorial Functions
904 -- 911Guifa Hou, Zhijie Wang. A Robust and Efficient Remote Authentication Scheme from Elliptic Curve Cryptosystem
912 -- 921Arup Kumar Chattopadhyay, Amitava Nag, Koushik Majumder. Secure Data Outsourcing on Cloud Using Secret Sharing Scheme
922 -- 928I-Chun Weng, Tzung-Her Chen. A Novel Weighted Visual Cryptography Scheme with High Visual Quality
929 -- 939Ram Charan Baishya, Nozrul Hoque, Dhruba Kumar Bhattacharyya. DDoS Attack Detection Using Unique Source IP Deviation
940 -- 949Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin. An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet
950 -- 954Zhengjun Cao, Lihua Liu, Olivier Markowitch. Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
955 -- 965Safi Ibrahim, Mohamed Hamdy, Eman Shaaban. Towards an Optimum Authentication Service Allocation and Availability in VANETs
966 -- 972Ming Luo, Yuwei Wan, Donghua Huang. Certificateless Hybrid Signcryption Scheme with Known Session-Specific Temporary Information Security
973 -- 983Mohamed Ali Hamza, Jianfei Sun, Xuyun Nie, Zhiquan Qin, Hu Xiong. Revocable ABE with Bounded Ciphertext in Cloud Computing
984 -- 994M. Y. Mohamed Parvees, J. Abdul Samath, B. Parameswaran Bose. Protecting Large Size Medical Images with Logistic Map Using Dynamic Parameters and Key Image
995 -- 1004Rui Guo, Huixian Shi. Confidentiality-Preserving Personal Health Records in Tele-Healthcare System Using Authenticated Certificateless Encryption
1005 -- 1015Hang Gao, Mengting Hu, Tiegang Gao, Renhong Cheng. Double Verifiable Lossless Secret Sharing Based on Hyper-chaos Generated Random Grid
1016 -- 1023Jianjun Zhang, Huajun Huang, Lucai Wang, HaiJun Lin, Deng Gao. Coverless Text Information Hiding Method Using the Frequent Words Hash
1024 -- 1035Kavitha R, Padmavathi G. Advanced Random Time Queue Blocking for Effective Protection of Application Servers Against Low-Rate DoS Attacks
1036 -- 1043Zhi-yong Luo, Bo You, Peng Wang, Jie Su, Yi Liang. Analysis and Optimization of System Intrusion Tolerance Capacity Based on Markov
1044 -- 1052Yang Zhao, Pengcheng Fan, Haoting Cai, Zhiguang Qin, Hu Xiong. Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare
1053 -- 1061Jongho Moon, Donghoon Lee, Jaewook Jung, Dongho Won. Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme
1062 -- 1071Sang Ni, Mengbo Xie, Quan Qian. Clustering Based K-anonymity Algorithm for Privacy Preservation
1072 -- 1079Fang Ren, Dong Zheng, Weijing Wang. An Efficient Code Based Digital Signature Algorithm

Volume 19, Issue 5

653 -- 659Iuon-Chang Lin, Tzu-Chun Liao. A Survey of Blockchain Security Issues and Challenges
660 -- 669Ebenezer Popoola, Aderemi Oluyinka Adewumi. Efficient Feature Selection Technique for Network Intrusion Detection System Using Discrete Differential Evolution and Decision
670 -- 674Minhong Sun, Yuan Qin, Jianrong Bao, Xutao Yu. GPS Spoofing Detection Based on Decision Fusion with a K-out-of-N Rule
675 -- 683Yousef Farhaoui. Design and Implementation of an Intrusion Prevention System Inspired Immune Systems
684 -- 693K. Brindha, N. Jeyanthi. Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage
694 -- 703Ihsan Jabbar, Saad Najim Alsaad. Design and Implementation of Secure Remote e-Voting System Using Homomorphic Encryption
704 -- 710Peng Hu, Haiying Gao. A Key-Policy Attribute-based Encryption Scheme for General Circuit from Bilinear Maps
711 -- 719Pramote Kuacharoen. An Anti-Phishing Password Authentication Protocol
720 -- 726Ye Tian, Yanbin Peng, Gaimei Gao, Xinguang Peng. Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage
727 -- 733Mohd Zaki Mas'ud, Shahrin Sahib, Mohd Faizal Abdollah, Siti Rahayu Selamat, Choo Yun Huoy. A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection
734 -- 741Sunny Behal, Krishan Kumar, Monika Sachdeva. Discriminating Flash Events from DDoS Attacks: A Comprehensive Review
742 -- 751Umesh Kumar Singh, Chanchala Joshi. Information Security Risk Management Framework for University Computing Environment
752 -- 760Qiu-yu Zhang, Wen-Jin Hu, Si-Bin Qiao, Yi-Bo Huang. Speech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction and Energy to Entropy Ratio
761 -- 775Swaswati Goswami, Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal Kalita. An Unsupervised Method for Detection of XSS Attack
776 -- 784Osman Wahballa, Abubaker Wahaballa, Fagen Li, Idris Ibn Idris, Chunxiang Xu. Medical Image Encryption Scheme Based on Arnold Transformation and ID-AK Protocol
785 -- 793Min Wu, Jianhua Chen, Ruibing Wang. An Enhanced Anonymous Password-based Authenticated Key Agreement Scheme with Formal Proof
794 -- 803Caimei Wang, Yan Xiong, Wenjuan Cheng, Wenchao Huang, Huihua Xia, Jianmeng Huang. A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems
804 -- 810Caihui Lan, Haifeng Li, Shoulin Yin, Lin Teng. A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption
811 -- 822Fei Tang, Yousheng Zhou. Policy-based Signatures for Predicates
823 -- 831Qianying Zhang, Zhiping Shi. A New Way to Prevent UKS Attacks Using Hardware Security Chips
832 -- 838Thai-Ngoc Luong, Thanh Tu Vo. Whirlwind: A New Method to Attack Routing Protocol in Mobile Ad Hoc Network
839 -- 850Jyh-Jian Sheu. Distinguishing Medical Web Pages from Pornographic Ones: An Efficient Pornography Websites Filtering Method
851 -- 857Yifei Yao, Fanhua Yu. Privacy-preserving Similarity Sorting in Multi-party Model
858 -- 862Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang. An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching

Volume 19, Issue 4

487 -- 497Hongfeng Zhu, Yifeng Zhang. An Improved Two-party Password-Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps
498 -- 506Mayada Tarek, Osama Ouda, Taher Hamza. Pre-image Resistant Cancelable Biometrics Scheme Using Bidirectional Memory Model
507 -- 516Cong Jin, Xiaoyan Wang. Propagation Model with Varying Population Size of Removable Memory Device Virus
517 -- 527Pipat Hiranvanichakorn. Provably Authenticated Group Key Agreement Based on Braid Groups - The Dynamic Case
528 -- 536Seyed Mahmood Hashemi, Jingsha He. An Evolutionary Multi-objective Approach for Modelling Network Security
537 -- 545Thangakumar Jeyaprakash, Rajeswari Mukesh. A New Trusted Routing Protocol for Vehicular Ad Hoc Networks Using Trusted Metrics
546 -- 550Ruifang Meng, Tongjiang Yan. New Constructions of Binary Interleaved Sequences with Low Autocorrelation
551 -- 558Mohammed Hassouna, Bazara I. A. Barry, Eihab Bashier. A New Level 3 Trust Hierarchal Certificateless Public Key Cryptography Scheme in the Random Oracle Model
559 -- 572Balamurugan Balusamy, P. Venkata Krishna, G. S. Tamizh Arasi, Victor Chang. A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System
573 -- 582Yang Chen, Yang Zhao, Hu Xiong, Feng Yue. A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability
583 -- 592Mina Malekzadeh, Moghis Ashrostaghi. COL-MOD: A New Module to Quantify the Weight of Damage Incurred by Collision Attacks
593 -- 598Sujarani Rajendran, Manivannan Doraipandian. Chaotic Map Based Random Image Steganography Using LSB Technique
599 -- 604Asif Uddin Khan, Bikram Kesari Ratha. A Secure Strong Designated Verifier Signature Scheme
605 -- 612Jianhong Zhang, Pengyan Li, Min Xu. On the Security of an Mutual Verifiable Provable Data Auditing in Public Cloud Storage
613 -- 622Zhixiong Chen, Vladimir Edemskiy. Linear Complexity of Quaternary Sequences Over Z4 Derived From Generalized Cyclotomic Classes Modulo 2p
623 -- 630Yilei Wang, Dongjie Yan, Fagen Li, Hu Xiong. A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment
631 -- 638Yanna Ma. NFC Communications-based Mutual Authentication Scheme for the Internet of Things
639 -- 643Wan-Yu Chao, Cheng-Yi Tsai, Min-Shiang Hwang. An Improved Key-Management Scheme for Hierarchical Access Control
644 -- 647Zhengping Jin, Hong Zhang, Zhongxian Li. Security on a Knapsack-Type Encryption Scheme Based Upon Hybrid-Model Assumption
648 -- 651Wei-Liang Tai, Ya-Fen Chang. Comments on a Secure Authentication Scheme for IoT and Cloud Servers

Volume 19, Issue 3

327 -- 334Li Liu, Anhong Wang, Chin-Chen Chang, Zhihong Li. A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding
335 -- 339Ahmed Drissi, Ahmed Asimi. Behavioral and Security Study of the OHFGC Hash Function
340 -- 346Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li. Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys
347 -- 357Cong Jin, Hui Liu. A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic
358 -- 370Udai Pratap Rao, Nikhil Kumar Singh. Weighted Role Based Data Dependency Approach for Intrusion Detection in Database
371 -- 382Yang Sun, Hongfeng Zhu, Xueshuai Feng. A Novel and Concise Multi-receiver Protocol Based on Chaotic Maps with Privacy Protection
383 -- 393Sunny Behal, Krishan Kumar. Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review
394 -- 405Seyed Mahmood Hashemi, Jingsha He, Alireza Ebrahimi Basabi. Multi-objective Optimization for Computer Security and Privacy
406 -- 412Chenglian Liu. A Study of Relationship Among Goldbach Conjecture, Twin Prime and Fibonacci Number
413 -- 420Devi Thiyagarajan, R. Ganesan. Cryptographically imposed model for Efficient Multiple Keyword-based Search over Encrypted Data in Cloud by Secure Index using Bloom Filter and False Random Bit Generator
421 -- 429K. Arthi, M. Chandra Mouli Reddy. A Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks
430 -- 442Raghav V. Sampangi, Srinivas Sampalli. Metamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks
443 -- 448Cheng-Yi Tsai, Chi-Yu Liu, Shyh-Chang Tsaur, Min-Shiang Hwang. A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms
449 -- 457Jianxing Cai, Yanli Ren, Tiejin Jiang. Verifiable Outsourcing Computation of Modular Exponentiations with Single Server
458 -- 468Yibing Wang, Jie Fang, Fuhu Wu. Application of Community Detection Algorithm with Link Clustering in Inhibition of Social Network Worms
469 -- 478Lidong Han, Qi Xie, Wenhao Liu. An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem
479 -- 486Khalid Charif, Ahmed Drissi, Zine El Abidine Guennoun. A Pseudo Random Number Generator Based on Chaotic Billiards

Volume 19, Issue 2

167 -- 176Omprakash Kaiwartya, Mukesh Prasad, Shiv Prakash, Durgesh Samadhiya, Abdul Hanan Abdullah, andSyed Othmawi Abd Rahman. An Investigation on Biometric Internet Security
177 -- 181Chung-Huei Ling, Cheng-Chi Lee, Chou Chen Yang, Min-Shiang Hwang. A Secure and Efficient One-time Password Authentication Scheme for WSN
182 -- 192Vrushank M. Shah, A. K. Agarwal. Reliable Alert Fusion of Multiple Intrusion Detection Systems
193 -- 204Jayam Modi, Manav Prajapati, Abhinav Sharma, Ravi Ojha, Devesh Jinwala. A Secure Communication Model for Expressive Access Control Using CP-ABE
205 -- 216Qian Mao, Chin-Chen Chang. Turbo Unequal Error Protection Codes with Multiple Protection Levels
217 -- 228Yang Sun, Xueshuai Feng, Hongfeng Zhu. Two-phase Commit with Security Services: Using Distinctive Proofs to Relieve Fragile Communications
229 -- 235Lunzhi Deng, Huawei Huang, Yunyun Qu. Identity Based Proxy Signature from RSA without Pairings
236 -- 243Junshe Wang, Jinliang Liu, Hongbin Zhang. Access Control Based Resource Allocation in Cloud Computing Environment
244 -- 250Abdulghani Ali Ahmed, Noorul Ahlami Kamarul Zaman. Attack Intention Recognition: A Review
251 -- 259Dipen Contractor, Dhiren R. Patel. Accountability in Cloud Computing by Means of Chain of Trust
260 -- 271Lifeng Yuan, MingChu Li, Cheng Guo, Wei-Tong Hu, Zhi-Hui Wang. A Verifiable E-voting Scheme with Secret Sharing
272 -- 284Hua Ma, Ting Peng, Zhenhua Liu. Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe
285 -- 294Cai-Sen Chen, Xi Yu, Yang-Xia Xiang, Xiong Li, Tengrun Li. An Improved DPA Attack on DES with Forth and Back Random Round Algorithm
295 -- 312Maged Hamada Ibrahim. SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem
313 -- 322Xingbing Fu, Xunyun Nie, Fagen Li. Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map
323 -- 326Zhengjun Cao, Lihua Liu. A Note on Two Schemes for Secure Outsourcing of Linear Programming

Volume 19, Issue 1

1 -- 10Yanjun Liu 0002, Chin-Chen Chang 0001, Shih-Chang Chang. An Efficient and Secure Smart Card Based Password Authentication Scheme
11 -- 19Liang Liu, Jun Ye. A Homomorphic Universal Re-encryptor for Identity-based Encryption
20 -- 26Fangwei Wang, Hongfeng Gao, Yong Yang, Changguang Wang. An SVEIR Defending Model with Partial Immunization for Worms
27 -- 38Hisham Abdalla, Xiong Hu, Abubaker Wahaballa, Ahmed Abdalla Ali, Mohammed Ramadan, Zhiguang Qin. Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme
39 -- 46Jie Ling, Ying Wang, Weifeng Chen. An Improved Privacy Protection Security Protocol Based on NFC
47 -- 59Padmapriya Praveenkumar, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan, Rengarajan Amirtharajan. Mojette (d) Secret Image "SEDIH" in an Encrypted Double Image - A Histo Approach
60 -- 71Kuo-Jui Wei, Jung-San Lee, Bo Li 0026. SMP: Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks
72 -- 84Suchart Khummanee, Kitt Tientanopajai. High-speed Firewall Rule Verification with O(1) Worst-case Access Time
85 -- 90Quanyu Zhao, Yining Liu, Gao Liu, Chin-Chen Chang 0001. A Novel Micropayment Scheme with Variable Denomination
91 -- 98Zhengjun Cao, Lihua Liu. The Paillier's Cryptosystem and Some Variants Revisited
99 -- 111Kritsanapong Somsuk, Kitt Tientanopajai. An Improvement of Fermat's Factorization by Considering the Last m Digits of Modulus to Decrease Computation Time
112 -- 117Shih-Ming Chen, Ching-Rong Yang, Min-Shiang Hwang. Using a New Structure in Group Key Management for Pay-TV
118 -- 126Feng Jiang, Paul Salama, Brian King. A Public-Key Approach of Selective Encryption for Images
127 -- 137Dan Liu, Shun Zhang, Hong Zhong 0001, Runhua Shi, Yimin Wang. An Efficient ID-based Online/Offline Signature Scheme without Key Escrow
138 -- 153Bo Meng, Chin-Tser Huang, Yitong Yang, Leyuan Niu, Dejun Wang. Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model
154 -- 162Qiang Jin, Zhihong Li, Chin-Chen Chang 0001, Anhong Wang, Li Liu. Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization
163 -- 166Binlin Cheng, Jianming Fu. Social Bots Detection on Mobile Social Networks