Journal: IJSN

Volume 8, Issue 4

179 -- 193Difan Zhang, Linqiang Ge, Wei Yu, Hanlin Zhang, Rommie L. Hardy, Robert J. Reschly. On effective data aggregation techniques in host-based intrusion detection in MANET
194 -- 199Mohamed M. Nasreldin Rasslan, Heba Kamal Aslan. On the security of two improved authenticated encryption schemes
200 -- 206Jia Yu, Rong Hao, Xiangguo Cheng. Security analysis and improvement of two verifiable multi-secret sharing schemes
207 -- 211Nedal Tahat. A new proxy signature scheme with a semi-trusted third party based on elliptic curve discrete logarithm problem
212 -- 230Mohamed Sarrab. Runtime verification using policy-based approach to control information flow
231 -- 238Brendan Cronin, Xiaojun Wang. Pattern overlap in bit-parallel implementation of regular expression repetition quantifiers

Volume 8, Issue 3

117 -- 129Erich Dondyk, Louis Rivera, Cliff Changchun Zou. Wi-Fi access denial of service attack to smartphones
130 -- 138Sheetal Kalra, Sandeep K. Sood. ECC-based anti-phishing protocol for cloud computing services
139 -- 153Anshu Tripathi, Umesh Kumar Singh. A model for quantitative security measurement and prioritisation of vulnerability mitigation
154 -- 168Wei Yu, Linqiang Ge, Difan Zhang, Rommie L. Hardy, Robert J. Reschly. On effective sampling techniques in host-based intrusion detection in tactical MANET
169 -- 178Pierre St. Juste, Heungsik Eom, Benjamin Woodruff, Corey Baker, Renato J. O. Figueiredo. Enabling decentralised microblogging through P2PVPNs

Volume 8, Issue 2

61 -- 71Prasanta Gogoi, Dhruba K. Bhattacharyya, Jugal K. Kalita. A rough set-based effective rule generation method for classification with an application in intrusion detection
72 -- 81Emad Eddien Abdallah, Alaa Eddien Abdallah, Mohammad Bsoul, Ahmed F. Otoom, Essam Al-Daoud. Simplified features for email authorship identification
82 -- 93Avinash Srinivasan, Satish Kolli, Jie Wu 0001. Steganographic information hiding that exploits a novel file system vulnerability
94 -- 105Annanda Thavymony Rath, Jean-Noel Colin. Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcare
106 -- 116Igor Santos, Carlos Laorden, Borja Sanz, Pablo Garcia Bringas. Reversing the effects of tokenisation attacks against content-based spam filters

Volume 8, Issue 1

1 -- 12Qinyi Li, Hu Xiong, Fengli Zhang. Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption
13 -- 28Neetesh Saxena, Narendra S. Chaudhari. An enhanced NPA protocol for secure communications in GSM network
29 -- 39Hui Cui, Yi Mu, Fuchun Guo. Server-aided identity-based anonymous broadcast encryption
40 -- 60Zhifeng Xiao, Bo Fu, Yang Xiao, C. L. Philip Chen, Wei Liang. A review of GENI authentication and access control mechanisms