Journal: I. J. Network Security

Volume 20, Issue 6

1005 -- 1015Abdelrahman Desoky. Uniform Resource Locator Based Steganography Methodology
1016 -- 1021Jialiang Zhang. Application of Artificial Intelligence Technology in Computer Network Security
1022 -- 1032Govand Kadir, Ihsan Alshahib Lami. Detection and Isolation of Wormholes in Mobile Ad-hoc Networks Using Localization Information
1033 -- 1041Jian-Hua Huang, Liang-Jie Chen, Fan-Chao Li, Ze Fang. Security Quantification Method for Intrusion Tolerance Systems Based on Multi-recovery
1042 -- 1052Mahesh Gangarde, Janardhan Chitode, Shruti Oza. Application of Video Watermarking Using Subdivision Technique to Enhance Information Security
1053 -- 1060Osama A. Khashan, Nour Mahmoud Khafajah. Secure Stored Images Using Transparent Crypto Filter Driver
1061 -- 1073Yongliang Zhao, Quan Qian. Android Malware Identification Through Visual Exploration of Disambly Files
1074 -- 1084Hua Ma, Xiaoyu Han, Ting Peng, Linchao Zhang. Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing
1085 -- 1092V. Sangeetha, S. Swapna Kumar. Probabilistic Framework for Assessing the Threat Level using Novel Decision Constructs in Mobile Adhoc Network
1093 -- 1104Animesh Hazra, Soumya Ghosh, Sampad Jash. A Review on DNA Based Cryptographic Techniques
1105 -- 1114Chunhu Li, Guangchun Luo, Chunbao Li. A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map
1115 -- 1124V. Preetha, K. Chitra. ZBMRP: Zone Based MANET Routing Protocol with Genetic Algorithm and Security Enhancement Using Neural Network Learning
1125 -- 1136Lili Yao, Jiabing Liu, Dejun Wang, Jing Li, Bo Meng. Formal Analysis of SDN Authentication Protocol with Mechanized Protocol Verifier in the Symbolic Model
1137 -- 1148Xiuxia Tian, Qian Song, Fuliang Tian. Multidimensional Data Aggregation Scheme For Smart Grid with Differential Privacy
1149 -- 1162Kittur P. Kibiwott, Fengli Zhang, Anyembe Andrew Omala, Daniel Adu-Gyamfi. Secure Cloudlet-based eHealth Big Data System with Fine-Grained Access Control and Outsourcing Decryption from ABE
1163 -- 1174Eman Tarek, Osama Ouda, Ahmed Atwan. Image-based Multimodal Biometric Authentication Using Double Random Phase Encoding
1175 -- 1182Ledi Fang, Shundong Li, Wenli Wang. An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines
1183 -- 1193Caixue Zhou, Yue Zhang, Lingmin Wang. A Provable Secure Identity-based Generalized Proxy Signcryption Scheme
1194 -- 1199Wenjie Yang, Min-Rong Chen, Guo-Qiang Zeng. Cryptanalysis of Two Strongly Unforgeable Identity-based Signatures in the Standard Model
1200 -- 1205Lin Teng, Hang Li. A High-efficiency Discrete Logarithm-based Multi-proxy Blind Signature Scheme via Elliptic Curve and Bilinear Mapping
1206 -- 1214Kamsiah Mohamed, Fakariah Hani Hj Mohd Ali, Suriyani Ariffin, Nur Hafiza Zakaria, Mohd Nazran Mohammed Pauzi. An Improved AES S-box Based on Fibonacci Numbers and Prime Factor
1215 -- 1220Yun Zhang. Research on the Security Protection of E-Commerce Information under the Background of Mobile Consumption
1221 -- 1226Li-Chin Huang, Ting Yi Chang, Min-Shiang Hwang. A Conference Key Scheme Based on the Diffie-Hellman Key Exchange
1227 -- 1233Lei Zhang. Supervision and Investigation of Internet Fraud Crimes

Volume 20, Issue 5

811 -- 819Abdullah Abdulrahman Al-khatib, Rosilah Hassan. Impact of IPSec Protocol on the Performance of Network Real-Time Applications: A Review
820 -- 826Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou. Improving Network Intrusion Detection Using Geometric Mean LDA
827 -- 835Umesh Kumar Singh, Chanchala Joshi. Scalable Approach Towards Discovery of Unknown Vulnerabilities
836 -- 843Ade Kurniawan, Imam Riadi. Detection and Analysis Cerber Ransomware Using Network Forensics Behavior Based
844 -- 852KwangHyok Jo, Weimin Lei, Zhaozheng Li, Xiaoshi Song. A Reversible Watermarking Algorithm in the Lossless Mode of HEVC
853 -- 861Travis Atkison, Stanislav Ponomarev, Randy K. Smith, Bernard Chen. Feature Extraction Optimization for Network Intrusion Detection in Control System Networks
862 -- 871Yanhui Lv, Kexin Liu, Deyu Zhang, Zhuo Miao. A Secure Routing Protocol Based on Reputation Mechanism
872 -- 878Lin Teng, Hang Li, Jie Liu, Shoulin Yin. An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-Attribute Sorting Method
879 -- 889Shaoquan Jiang, Min Li, Zailiang Tang. A New Scheme for Source-location Privacy in Wireless Sensor Networks
890 -- 897Raja Muthalagu, Subeen Jain. Application of FSM Machine and S-Box in KASUMI Block Cipher to Improve Its Resistance Against Attack
898 -- 906Muawia A. Elsadig, Yahia A. Fadlalla. An Efficient Approach to Resolve Covert Channels
907 -- 913Yanhua Wang, Yaqiu Liu, Kun Wang. A Secure and Efficient Ciphertext Encryption Scheme Based on Attribute and Support Strategy Dynamic Update Via Hybrid Encryption
914 -- 922Lincy Elizebeth Jim, Mark A. Gregory. A Grudger Based AIS Approach to Coerce Selfish Node Cooperation in MANET
923 -- 930Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu. Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS
931 -- 937Shuang-Gen Liu, Xue-Jing Sun. A Fast Scalar Multiplication Algorithm Based on Alternate-Zeckendorf Representation
938 -- 950Rui Xie, Jie Ling, Dao-wei Liu. A Wireless Key Generation Algorithm for RFID System Based on Bit Operation
951 -- 959Vegi Srinivas, Vatsavayi Valli Kumari, K. V. S. V. N. Raju. Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust
960 -- 970Xiaolong Xu, Zhonghe Gao, Lijuan Han. An Efficient Compromised Nodes Detection System in Wireless Sensor Networks
971 -- 982Kazeem O. Okosun, Samson Ogunlade, Ebenezer Bonyah. Optimal Control Analysis of Computer Virus Transmission
983 -- 987Li Lin. A Detection and Defense Technology for Information-stealing and Deceitful Trojan Viruses Based on Behavioral Features
988 -- 997Samuel Jackson, Jeremy Straub, Scott Kerlin. Exploring a Novel Cryptographic Solution for Securing Small Satellite Communications
998 -- 1004Cheng-Yi Tsai, Cheng-Ying Yang, Iuon-Chang Lin, Min-Shiang Hwang. A Survey of E-book Digital Right Management

Volume 20, Issue 4

601 -- 608Arun Malik, Babita Pandey. Security Analysis of Discrete Event Based Threat Driven Authentication Approach in VANET Using Petri Nets
609 -- 616Bei Xie, Jiaohua Qin, Xuyu Xiang, Hao Li, Lili Pan. An Image Retrieval Algorithm Based on Gist and Sift Features
617 -- 624Chitra Rajarama, Jagadeesha Narasimhamurthy Sugatoor, T. Yerri Swamy. Diffie-Hellman Type Key Exchange, ElGamal Like Encryption/Decryption and Proxy Re-encryption Using Circulant Matrices
625 -- 635Dindayal Mahto, Dilip Kumar Yadav. Performance Analysis of RSA and Elliptic Curve Cryptography
636 -- 644Mourad Abdeljebbar, Rachid El Kouch. Security Improvements of EPS-AKA Protocol
645 -- 654Yasir Hamid, Veeran Ranganathan Balasaraswathi, Ludovic Journaux, Muthukumarasamy Sugumaran. Benchmark Datasets for Network Intrusion Detection: A Review
655 -- 663Fadi Al-Ayed, Chunqiang Hu, Hang Liu. An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions
664 -- 673Ming Yang, Rong Jiang, Tilei Gao, Wanyu Xie, Jia Wang. Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain
674 -- 682Xu Wu. Study on Trust Model for Multi-users in Cloud Computing
683 -- 688Zhengjun Cao, Chong Mao, Lihua Liu, Wenping Kong, Jinbo Wang. Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
689 -- 701Divyashikha Sethia, Huzur Saran, Daya Gupta. CP-ABE for Selective Access with Scalable Revocation: A Case Study for Mobile-based Healthfolder
702 -- 709Prakash G. L, Manish Prateek, Inder Singh. Data Verification Using Block Level Batch Auditing on Multi-cloud Server
710 -- 720Tao Feng, Jiaqi Guo. A New Access Control System Based on CP-ABE in Named Data Networking
721 -- 729Shaila Ghanti, G. M. Naik. Defense Techniques of SYN Flood Attack Characterization and Comparisons
730 -- 737K. Murugan, P. Suresh. Efficient Anomaly Intrusion Detection Using Hybrid Probabilistic Techniques in Wireless Ad Hoc Network
738 -- 745K. Veena, K. Meena. Identification of Cyber Criminal by Analysing the Users Profile
746 -- 753V. S. Janani, M. S. K. Manikandan. An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks
754 -- 761Yunfa Li, Yangyang Shen, Mingyi Li. A Credible Mechanism of Service about Data Resource in Cloud Computing
762 -- 773Ke Gu, Linyu Wang, Na Wu, Niandong Liao. Traceable Certificateless Ring Signature Scheme For No Full Anonymous Applications
774 -- 787Kazi Md. Rokibul Alam, Adnan Maruf, Md. Rezaur Rahman Rakib, G. G. Md. Nawaz Ali, Peter Han Joo Chong, Yasuhiko Morimoto. An Untraceable Voting Scheme Based on Pairs of Signatures
788 -- 800Youssef Harmouch, Rachid Elkouch, Hussain Ben-Azza. Multiple New Formulas for Cipher Performance Computing
801 -- 804Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang. A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching
805 -- 810Cen Zuo. Defense of Computer Network Viruses Based on Data Mining Technology

Volume 20, Issue 3

403 -- 413Rena Ehmet, Lunzhi Deng, Yingying Zhang, Jiwen Zeng. Multi-proxy Multi-signature without Pairing from Certificateless Cryptography
414 -- 422Debsmita Ghosh, Celia Li, Cungang Yang. A Lightweight Authentication Protocol in Smart Grid
423 -- 432Prakash Annamalai, Krishnaveni Raju, Dhanalakshmi Ranganayakulu. Soft Biometrics Traits for Continuous Authentication in Online Exam Using ICA Based Facial Recognition
433 -- 438Sujatha Sivabalan, Peter J. Radcliffe. Feasibility of Eliminating IDPS Devices from a Web Server Farm
439 -- 446Qiuhua Wang, Hongxia Zhang, Qiuyun Lyu, Xiaojun Wang, Jianrong Bao. A Novel Physical Channel Characteristics-based Channel Hopping Scheme for Jamming-resistant in Wireless Communication
447 -- 454Sreeja Cherillath Sukumaran, Mohammed Misbahuddin. DNA Cryptography for Secure Data Storage in Cloud
455 -- 462Gitika Maity, Jaydeb Bhaumik, Anjan Kundu. A New SPN Type Architecture to Strengthen Block Cipher Against Fault Attack
463 -- 471Hongfeng Zhu, Junlin Liu. Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture
472 -- 477Gang Lu, Linyuan Xuan, Xuyun Nie, Zhiguang Qin, Bo Liu. Cubic Medium Field Equation Public Key Cryptosystem
478 -- 488Chin-Chen Chang, Ngoc-Tu Huynh, Yu-Kai Wang, Yanjun Liu. An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes
489 -- 495Ahmed A. Elngar. IoT-based Efficient Tamper Detection Mechanism for Healthcare Application
496 -- 501Zhe Wei, Shuyan Yu. Energy Aware and Trust Based Cluster Head Selection for Ad-hoc Sensor Networks
502 -- 508Lina Zou, Xueying Wang, Shoulin Yin. A Data Sorting and Searching Scheme Based on Distributed Asymmetric Searchable Encryption
509 -- 514Gang Lu, Linyuan Xue, Xuyun Nie, Zhiguang Qin. Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle
515 -- 526Ranjit Kumar Upadhyay, Sangeeta Kumari. Global Stability of Worm Propagation Model with Nonlinear Incidence Rate in Computer Network
527 -- 535Putla Harsha, Patibandla Chanakya, Vadlamudi China Venkaiah. A Reusable Multipartite Secret Sharing Scheme Based on Superincreasing Sequence
536 -- 546Xiaogang Wang, Weiren Shi. Secure Time Synchronization Protocol for Wireless Sensor Network Based on µTESLA Protocol
547 -- 557Ramesh Singh Rawat, Emmanuel S. Pilli, Ramesh Chandra Joshi. Survey of Peer-to-Peer Botnets and Detection Frameworks
558 -- 567Aaron Zimba, Hongsong Chen, ZhaoShun Wang. Bayesian-Boolean Logic Security Assessment Model for Malware-Free Intrusions
568 -- 574Chandrashekhar Meshram, Sarita Gajbhiye Meshram, Cheng-Chi Lee. Constructing Provably Secure ID-based Beta Cryptographic Scheme in Random Oracle
575 -- 584Huiying Hou, Jia Yu, Rong Hao. Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing
585 -- 592Mohammed Abdel-Azim, Hossam El-Din Salah, menas ebrahim eissa. IDS Against Black-Hole Attack for MANET
593 -- 600Huang Cong, Wang Chao. Network Security Situation Awareness Based on the Optimized Dynamic Wavelet Neural Network

Volume 20, Issue 2

201 -- 205Cheng-Yi Tsai, Pi-Fang Ho, Min-Shiang Hwang. A Secure Group Signature Scheme
206 -- 216Yi-Bo Huang, Qiu-yu Zhang, Wen-Jin Hu. Robust Speech Perception Hashing Authentication Algorithm Based on Spectral Subtraction and Multi-feature Tensor
217 -- 224Naresh Babu Muthu Mohan, Ardhani Sathya Narayana Chakravarthy, Cherukuri Ravindranath. Cryptanalysis of Design and Analysis of a Provably Secure Multi-server Authentication Scheme
225 -- 234Debasish Das, Dhruba Kumar Bhattacharyya. Defeating Cyber Attacks Due to Script Injection
235 -- 242Chunlin Jiang, Shi-lan Wu, Ke Gu. New Kind of Delegation-based Anonymous Authentication Scheme for Wireless Roaming Networks
243 -- 255Kakali Chatterjee, Lalita Priya. HKDS: A Hierarchical Key Distribution Scheme for Wireless Ad Hoc Network
256 -- 265Septafiansyah Dwi Putra, Ma'muri, Sarwono Sutikno, Yusuf Kurniawan, Adang Suwandi Ahmad. Design of an AES Device as Device Under Test in a DPA Attack
266 -- 277Sujuan Li, Yi Mu, Mingwu Zhang. Certificate-based Smooth Projective Hashing and Its Applications
278 -- 290Tzu-Chun Lin. A Study of Non-Abelian Public Key
291 -- 303Shilpa Deshpande, Rajesh Ingle. Evidence Based Trust Estimation Model for Cloud Computing Services
304 -- 312Sujatha Sivabalan, P. J. Radcliffe. Power Efficient Secure Web Servers
313 -- 322Hongfeng Zhu, Rui Wang. A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography
323 -- 331Cheng Guo, Chin-Chen Chang, Shih-Chang Chang. A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications
332 -- 336Jie Fang, Chenglian Liu. A Generalize Estimating the Ø(n) of Upper-Lower Bound to RSA Public Key Crytosystem
337 -- 344Celia Li, Helen Cheung, Cungang Yang. Secure and Efficient Authentication Protocol for Power System Computer Networks
345 -- 358Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang. Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model
359 -- 370Rui-Hong Dong, Dong-Fang Wu, Qiu-yu Zhang, Tao Zhang. Traffic Characteristic Map-based Intrusion Detection Model for Industrial Internet
371 -- 380Mohamed Rasslan, Ghada F. El-Kabbany, Heba Kamal Aslan. New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism
381 -- 389P. Kavitha, Rajeswari Mukesh. Detection of Impersonation Attack in MANET Using Polynomial Reduction Algorithm
390 -- 395Xueqin Zhang, Baoping Wang, Wei Wang. A New Remote Authentication Scheme for Anonymous Users Using Elliptic Curves Cryptosystem
396 -- 402Shin Yan Chiou, Wen-Tsai Ko, Erl-Huei Lu. A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application

Volume 20, Issue 1

1 -- 8Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang. A Survey of Reversible Data Hiding for VQ-Compressed Images
9 -- 18M. Seshadri Srinath, Venkatachalam Chandrasekaran. Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme
19 -- 24Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji. New Protocol E-DNSSEC to Enhance DNSSEC Security
25 -- 34Mohamed el Boujnouni, Mohamed Jedra. New Intrusion Detection System Based on Support Vector Domain Description with Information Gain Metric
35 -- 40Mikhail Styugin. Establishing Systems Secure from Research with Implementation in Encryption Algorithms
41 -- 55Amrita, Kiran Kumar Ravulakollu. A Hybrid Intrusion Detection System: Integrating Hybrid Feature Selection Approach with Heterogeneous Ensemble of Intelligent Classifiers
56 -- 64Amin Nezarat. Distributed Intrusion Detection System Based on Mixed Cooperative and Non-Cooperative Game Theoretical Model
65 -- 77Jian-Jun Li, Yun-He Wu, Chin-Feng Lee, Chin-Chen Chang. Generalized PVO-K Embedding Technique for Reversible Data Hiding
78 -- 87Rui Guo, Huixian Shi. An Efficient Confidentiality Preserving Scheme Using Certificateless Encryption with High Trust Level
88 -- 94V. Padmavathi, B. Vishnu Vardhan, Addepalli V. N. Krishna. Provably Secure Quantum Key Distribution By Applying Quantum Gate
95 -- 109Nyamsuren Vaanchig, Hu Xiong, Wei Chen, Zhiguang Qin. Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation
110 -- 120Xiaodong Li, Cailan Zhou, Ning Xu. A Secure and Efficient Image Encryption Algorithm Based on DNA Coding and Spatiotemporal Chaos
121 -- 130Yudha Purwanto, Kuspriyanto, Hendrawan, Budi Rahardjo. Cost Analysis for Classification-based Autonomous Response Systems
131 -- 140Rui-Hong Dong, Dong-Fang Wu, Qiu-yu Zhang, Hong-xiang Duan. Mutual Information-based Intrusion Detection Model for Industrial Internet
141 -- 148Mostafa Behi, Mohammad GhasemiGol, Hamed Vahdat-Nejad. A New Approach to Quantify Network Security by Ranking of Security Metrics and Considering Their Relationships
149 -- 156Rui Xie, Bi-yuan Jian, Dao-wei Liu. An Improved Ownership Transfer for RFID Protocol
157 -- 167Hongzhuan Zhao, Dihua Sun, Hang Yue, Min Zhao, Senlin Cheng. Dynamic Trust Model for Vehicular Cyber-Physical Systems
168 -- 176Leyou Zhang, Hongjian Yin. Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption
177 -- 183Said Bouchkaren, Saiida Lazaar. CAES Cryptosystem: Advanced Security Tests and Results
184 -- 192Helmi Md Rais, Tahir Mehmood. Dynamic Ant Colony System with Three Level Update Feature Selection for Intrusion Detection
193 -- 200Dan Tang, Yaqiang Wang, Haopeng Yang. Array Erasure Codes with Preset Fault Tolerance Capability