Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijnsec/ijnsec19.bht:"
@article{DBLP:journals/ijnsec/00020C17, author = {Yanjun Liu and Chin{-}Chen Chang and Shih{-}Chang Chang}, title = {An Efficient and Secure Smart Card Based Password Authentication Scheme}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {1--10}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p1-10.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/00020C17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AbdallaHWARQ17, author = {Hisham Abdalla and Hu Xiong and Abubaker Wahaballa and Ahmed Abdalla Ali and Mohammed Ramadan and Zhiguang Qin}, title = {Integrating the Functional Encryption and Proxy Re-cryptography to Secure {DRM} Scheme}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {27--38}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p27-38.pdf}, timestamp = {Mon, 15 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AbdallaHWARQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AhmedZ17, author = {Abdulghani Ali Ahmed and Noorul Ahlami Kamarul Zaman}, title = {Attack Intention Recognition: {A} Review}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {244--250}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p244-250.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AhmedZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ArthiR17, author = {K. Arthi and M. Chandra Mouli Reddy}, title = {A Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol for Mobile Social Networks}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {421--429}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p421-429.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ArthiR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AzrourFO17, author = {Mourade Azrour and Yousef Farhaoui and Mohammed Ouanan}, title = {A New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {870--879}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p870-879.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AzrourFO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BaishyaHB17, author = {Ram Charan Baishya and Nazrul Hoque and Dhruba Kumar Bhattacharyya}, title = {DDoS Attack Detection Using Unique Source {IP} Deviation}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {929--939}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p929-939.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BaishyaHB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BalusamyKAC17, author = {Balamurugan Balusamy and P. Venkata Krishna and G. S. Tamizh Arasi and Victor Chang}, title = {A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {559--572}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p559-572.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BalusamyKAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BehalK17, author = {Sunny Behal and Krishan Kumar}, title = {Characterization and Comparison of DDoS Attack Tools and Traffic Generators: {A} Review}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {383--393}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p383-393.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BehalK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BehalKS17, author = {Sunny Behal and Krishan Kumar and Monika Sachdeva}, title = {Discriminating Flash Events from DDoS Attacks: {A} Comprehensive Review}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {734--741}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p734-741.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BehalKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BrindhaJ17, author = {K. Brindha and N. Jeyanthi}, title = {Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {684--693}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p684-693.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BrindhaJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CaiRJ17, author = {Jianxing Cai and Yanli Ren and Tiejin Jiang}, title = {Verifiable Outsourcing Computation of Modular Exponentiations with Single Server}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {449--457}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p449-457.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CaiRJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CaoL17, author = {Zhengjun Cao and Lihua Liu}, title = {A Note on Two Schemes for Secure Outsourcing of Linear Programming}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {323--326}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p323-326.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CaoL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CaoL17a, author = {Zhengjun Cao and Lihua Liu}, title = {The Paillier's Cryptosystem and Some Variants Revisited}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {91--98}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p91-98.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CaoL17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CaoLM17, author = {Zhengjun Cao and Lihua Liu and Olivier Markowitch}, title = {Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {950--954}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p950-954.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CaoLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChandeLL17, author = {Manoj Kumar Chande and Cheng{-}Chi Lee and Chun{-}Ta Li}, title = {Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {340--346}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p340-346.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChandeLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChaoTH17, author = {Wan{-}Yu Chao and Cheng{-}Yi Tsai and Min{-}Shiang Hwang}, title = {An Improved Key-Management Scheme for Hierarchical Access Control}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {639--643}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p639-643.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChaoTH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/CharifDG17, author = {Khalid Charif and Ahmed Drissi and Zine El Abidine Guennoun}, title = {A Pseudo Random Number Generator Based on Chaotic Billiards}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {479--486}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p479-486.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/CharifDG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChattopadhyayNM17, author = {Arup Kumar Chattopadhyay and Amitava Nag and Koushik Majumder}, title = {Secure Data Outsourcing on Cloud Using Secret Sharing Scheme}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {912--921}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p912-921.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChattopadhyayNM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChenE17, author = {Zhixiong Chen and Vladimir Edemskiy}, title = {Linear Complexity of Quaternary Sequences Over {Z4} Derived From Generalized Cyclotomic Classes Modulo 2p}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {613--622}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p613-622.pdf}, timestamp = {Mon, 07 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChenE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChenYH17, author = {Jong{-}Shin Chen and Cheng{-}Ying Yang and Min{-}Shiang Hwang}, title = {The Capacity Analysis in the Secure Cooperative Communication System}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {863--869}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p863-869.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChenYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChenYH17a, author = {Shih{-}Ming Chen and Ching{-}Rong Yang and Min{-}Shiang Hwang}, title = {Using a New Structure in Group Key Management for Pay-TV}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {112--117}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p112-117.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChenYH17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChenYXLL17, author = {Cai{-}Sen Chen and Xi Yu and Yang{-}Xia Xiang and Xiong Li and Tengrun Li}, title = {An Improved {DPA} Attack on {DES} with Forth and Back Random Round Algorithm}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {285--294}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p285-294.pdf}, timestamp = {Sun, 07 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChenYXLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChenZXY17, author = {Yang Chen and Yang Zhao and Hu Xiong and Feng Yue}, title = {A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {573--582}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p573-582.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChenZXY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChengF17, author = {Binlin Cheng and Jianming Fu}, title = {Social Bots Detection on Mobile Social Networks}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {163--166}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p163-166.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChengF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ContractorP17, author = {Dipen Contractor and Dhiren R. Patel}, title = {Accountability in Cloud Computing by Means of Chain of Trust}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {251--259}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p251-259.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ContractorP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/DengHQ17, author = {Lunzhi Deng and Huawei Huang and Yunyun Qu}, title = {Identity Based Proxy Signature from {RSA} without Pairings}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {229--235}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p229-235.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/DengHQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/DongWZ17, author = {Rui{-}Hong Dong and Dong{-}Fang Wu and Qiu{-}Yu Zhang}, title = {The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {880--888}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p880-888.pdf}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/DongWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/DrissiA17, author = {Ahmed Drissi and Ahmed Asimi}, title = {Behavioral and Security Study of the {OHFGC} Hash Function}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {335--339}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p335-339.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/DrissiA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Farhaoui17, author = {Yousef Farhaoui}, title = {Design and Implementation of an Intrusion Prevention System Inspired Immune Systems}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {675--683}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p675-683.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Farhaoui17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/FuNL17, author = {Xingbing Fu and Xunyun Nie and Fagen Li}, title = {Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {313--322}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p313-322.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/FuNL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GaoHGC17, author = {Hang Gao and Mengting Hu and Tiegang Gao and Renhong Cheng}, title = {Double Verifiable Lossless Secret Sharing Based on Hyper-chaos Generated Random Grid}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {1005--1015}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1005-1015.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GaoHGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GoswamiHBK17, author = {Swaswati Goswami and Nazrul Hoque and Dhruba K. Bhattacharyya and Jugal Kalita}, title = {An Unsupervised Method for Detection of {XSS} Attack}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {761--775}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p761-775.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GoswamiHBK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GuoS17, author = {Rui Guo and Huixian Shi}, title = {Confidentiality-Preserving Personal Health Records in Tele-Healthcare System Using Authenticated Certificateless Encryption}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {995--1004}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p995-1004.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GuoS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HamzaSNQX17, author = {Mohamed Ali Hamza and Jianfei Sun and Xuyun Nie and Zhiquan Qin and Hu Xiong}, title = {Revocable {ABE} with Bounded Ciphertext in Cloud Computing}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {973--983}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p973-983.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HamzaSNQX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HanXL17, author = {Lidong Han and Qi Xie and Wenhao Liu}, title = {An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {469--478}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p469-478.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HanXL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HashemiH17, author = {Seyed Mahmood Hashemi and Jingsha He}, title = {An Evolutionary Multi-objective Approach for Modelling Network Security}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {528--536}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p528-536.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HashemiH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HashemiHB17, author = {Seyed Mahmood Hashemi and Jingsha He and Alireza Ebrahimi Basabi}, title = {Multi-objective Optimization for Computer Security and Privacy}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {394--405}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p394-405.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HashemiHB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HassounaBB17, author = {Mohammed Hassouna and Bazara I. A. Barry and Eihab Bashier}, title = {A New Level 3 Trust Hierarchal Certificateless Public Key Cryptography Scheme in the Random Oracle Model}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {551--558}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p551-558.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HassounaBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HeYXQ17, author = {Libo He and Chen Yuan and Hu Xiong and Zhiguang Qin}, title = {An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {940--949}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p940-949.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HeYXQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Hiranvanichakorn17, author = {Pipat Hiranvanichakorn}, title = {Provably Authenticated Group Key Agreement Based on Braid Groups - The Dynamic Case}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {517--527}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p517-527.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Hiranvanichakorn17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HouW17, author = {Guifa Hou and Zhijie Wang}, title = {A Robust and Efficient Remote Authentication Scheme from Elliptic Curve Cryptosystem}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {904--911}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p904-911.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HouW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HuG17, author = {Peng Hu and Haiying Gao}, title = {A Key-Policy Attribute-based Encryption Scheme for General Circuit from Bilinear Maps}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {704--710}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p704-710.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HuG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Ibrahim17, author = {Maged Hamada Ibrahim}, title = {SecureCoin: {A} Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {295--312}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p295-312.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Ibrahim17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/IbrahimHS17, author = {Safi Ibrahim and Mohamed Hamdy and Eman Shaaban}, title = {Towards an Optimum Authentication Service Allocation and Availability in VANETs}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {955--965}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p955-965.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/IbrahimHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JabbarA17, author = {Ihsan Jabbar and Saad Najim Alsaad}, title = {Design and Implementation of Secure Remote e-Voting System Using Homomorphic Encryption}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {694--703}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p694-703.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/JabbarA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JeyaprakashM17, author = {Thangakumar Jeyaprakash and Rajeswari Mukesh}, title = {A New Trusted Routing Protocol for Vehicular Ad Hoc Networks Using Trusted Metrics}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {537--545}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p537-545.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/JeyaprakashM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JiangSK17, author = {Feng Jiang and Paul Salama and Brian King}, title = {A Public-Key Approach of Selective Encryption for Images}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {118--126}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p118-126.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/JiangSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JinL0WL17, author = {Qiang Jin and Zhihong Li and Chin{-}Chen Chang and Anhong Wang and Li Liu}, title = {Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using Particle Swarm Optimization}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {154--162}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p154-162.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/JinL0WL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JinL17, author = {Cong Jin and Hui Liu}, title = {A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {347--357}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p347-357.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/JinL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JinW17, author = {Cong Jin and Xiaoyan Wang}, title = {Propagation Model with Varying Population Size of Removable Memory Device Virus}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {507--516}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p507-516.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/JinW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/JinZL17, author = {Zhengping Jin and Hong Zhang and Zhongxian Li}, title = {Security on a Knapsack-Type Encryption Scheme Based Upon Hybrid-Model Assumption}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {644--647}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p644-647.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/JinZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KaiwartyaPPSAR17, author = {Omprakash Kaiwartya and Mukesh Prasad and Shiv Prakash and Durgesh Samadhiya and Abdul Hanan Abdullah and Syed Othmawi Abd Rahman}, title = {An Investigation on Biometric Internet Security}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {167--176}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p167-176.pdf}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KaiwartyaPPSAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KhanR17, author = {Asif Uddin Khan and Bikram Kesari Ratha}, title = {A Secure Strong Designated Verifier Signature Scheme}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {599--604}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p599-604.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KhanR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KhummaneeT17, author = {Suchart Khummanee and Kitt Tientanopajai}, title = {High-speed Firewall Rule Verification with {O(1)} Worst-case Access Time}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {72--84}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p72-84.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KhummaneeT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Kuacharoen17, author = {Pramote Kuacharoen}, title = {An Anti-Phishing Password Authentication Protocol}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {711--719}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p711-719.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Kuacharoen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LanLYT17, author = {Caihui Lan and Haifeng Li and Shoulin Yin and Lin Teng}, title = {A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {804--810}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p804-810.pdf}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/LanLYT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LinL17, author = {Iuon{-}Chang Lin and Tzu{-}Chun Liao}, title = {A Survey of Blockchain Security Issues and Challenges}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {653--659}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p653-659.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LinL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LingLYH17, author = {Chung{-}Huei Ling and Cheng{-}Chi Lee and Chou Chen Yang and Min{-}Shiang Hwang}, title = {A Secure and Efficient One-time Password Authentication Scheme for {WSN}}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {177--181}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p177-181.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LingLYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LingWC17, author = {Jie Ling and Ying Wang and Weifeng Chen}, title = {An Improved Privacy Protection Security Protocol Based on {NFC}}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {39--46}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p39-46.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LingWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Liu17, author = {Chenglian Liu}, title = {A Study of Relationship Among Goldbach Conjecture, Twin Prime and Fibonacci Number}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {406--412}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p406-412.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Liu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiuWCL17, author = {Li Liu and Anhong Wang and Chin{-}Chen Chang and Zhihong Li}, title = {A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {327--334}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p327-334.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiuWCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiuY17, author = {Liang Liu and Jun Ye}, title = {A Homomorphic Universal Re-encryptor for Identity-based Encryption}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {11--19}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p11-19.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiuY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiuZ0SW17, author = {Dan Liu and Shun Zhang and Hong Zhong and Runhua Shi and Yimin Wang}, title = {An Efficient ID-based Online/Offline Signature Scheme without Key Escrow}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {127--137}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p127-137.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiuZ0SW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LuoWH17, author = {Ming Luo and Yuwei Wan and Donghua Huang}, title = {Certificateless Hybrid Signcryption Scheme with Known Session-Specific Temporary Information Security}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {966--972}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p966-972.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LuoWH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LuoYWSL17, author = {Zhi{-}yong Luo and Bo You and Peng Wang and Jie Su and Yi Liang}, title = {Analysis and Optimization of System Intrusion Tolerance Capacity Based on Markov}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {1036--1043}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1036-1043.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LuoYWSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LuongV17, author = {Thai{-}Ngoc Luong and Thanh Tu Vo}, title = {Whirlwind: {A} New Method to Attack Routing Protocol in Mobile Ad Hoc Network}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {832--838}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p832-838.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LuongV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Ma17, author = {Yanna Ma}, title = {{NFC} Communications-based Mutual Authentication Scheme for the Internet of Things}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {631--638}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p631-638.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Ma17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MaPL17, author = {Hua Ma and Ting Peng and Zhenhua Liu}, title = {Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {272--284}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p272-284.pdf}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/MaPL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MalekzadehA17, author = {Mina Malekzadeh and Moghis Ashrostaghi}, title = {{COL-MOD:} {A} New Module to Quantify the Weight of Damage Incurred by Collision Attacks}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {583--592}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p583-592.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MalekzadehA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MaoC17, author = {Qian Mao and Chin{-}Chen Chang}, title = {Turbo Unequal Error Protection Codes with Multiple Protection Levels}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {205--216}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p205-216.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MaoC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MasudSASH17, author = {Mohd Zaki Mas'ud and Shahrin Sahib and Mohd Faizal Abdollah and Siti Rahayu Selamat and Choo Yun Huoy}, title = {A Comparative Study on Feature Selection Method for N-gram Mobile Malware Detection}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {727--733}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p727-733.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MasudSASH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MengHYNW17, author = {Bo Meng and Chin{-}Tser Huang and Yitong Yang and Leyuan Niu and Dejun Wang}, title = {Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {138--153}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p138-153.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MengHYNW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MengY17, author = {Ruifang Meng and Tongjiang Yan}, title = {New Constructions of Binary Interleaved Sequences with Low Autocorrelation}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {546--550}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p546-550.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MengY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ModiPSOJ17, author = {Jayam Modi and Manav Prajapati and Abhinav Sharma and Ravi Ojha and Devesh Jinwala}, title = {A Secure Communication Model for Expressive Access Control Using {CP-ABE}}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {193--204}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p193-204.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ModiPSOJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MoonLJW17, author = {Jongho Moon and Donghoon Lee and Jaewook Jung and Dongho Won}, title = {Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {1053--1061}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1053-1061.pdf}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/MoonLJW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/NiXQ17, author = {Sang Ni and Mengbo Xie and Quan Qian}, title = {Clustering Based K-anonymity Algorithm for Privacy Preservation}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {1062--1071}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1062-1071.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/NiXQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ParveesSB17, author = {M. Y. Mohamed Parvees and J. Abdul Samath and B. Parameswaran Bose}, title = {Protecting Large Size Medical Images with Logistic Map Using Dynamic Parameters and Key Image}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {984--994}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p984-994.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ParveesSB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/PopoolaA17, author = {Ebenezer Popoola and Aderemi Oluyinka Adewumi}, title = {Efficient Feature Selection Technique for Network Intrusion Detection System Using Discrete Differential Evolution and Decision}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {660--669}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p660-669.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/PopoolaA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/PraveenkumarTRA17, author = {Padmapriya Praveenkumar and Karuppuswamy Thenmozhi and John Bosco Balaguru Rayappan and Rengarajan Amirtharajan}, title = {Mojette (d) Secret Image "SEDIH" in an Encrypted Double Image - {A} Histo Approach}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {47--59}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p47-59.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/PraveenkumarTRA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RG17, author = {Kavitha R and Padmavathi G}, title = {Advanced Random Time Queue Blocking for Effective Protection of Application Servers Against Low-Rate DoS Attacks}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {1024--1035}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1024-1035.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RajendranD17, author = {Sujarani Rajendran and Manivannan Doraipandian}, title = {Chaotic Map Based Random Image Steganography Using {LSB} Technique}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {593--598}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p593-598.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RajendranD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RaoS17, author = {Udai Pratap Rao and Nikhil Kumar Singh}, title = {Weighted Role Based Data Dependency Approach for Intrusion Detection in Database}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {358--370}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p358-370.pdf}, timestamp = {Fri, 25 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/RaoS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RenZW17, author = {Fang Ren and Dong Zheng and WeiJing Wang}, title = {An Efficient Code Based Digital Signature Algorithm}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {1072--1079}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1072-1079.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RenZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SampangiS17, author = {Raghav V. Sampangi and Srinivas Sampalli}, title = {Metamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {430--442}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p430-442.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SampangiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ShahA17, author = {Vrushank M. Shah and A. K. Agarwal}, title = {Reliable Alert Fusion of Multiple Intrusion Detection Systems}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {182--192}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p182-192.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ShahA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Sheu17, author = {Jyh{-}Jian Sheu}, title = {Distinguishing Medical Web Pages from Pornographic Ones: An Efficient Pornography Websites Filtering Method}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {839--850}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p839-850.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Sheu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SinghJ17, author = {Umesh Kumar Singh and Chanchala Joshi}, title = {Information Security Risk Management Framework for University Computing Environment}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {742--751}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p742-751.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SinghJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SomsukT17, author = {Kritsanapong Somsuk and Kitt Tientanopajai}, title = {An Improvement of Fermat's Factorization by Considering the Last m Digits of Modulus to Decrease Computation Time}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {99--111}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p99-111.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SomsukT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SunFZ17, author = {Yang Sun and Xueshuai Feng and Hongfeng Zhu}, title = {Two-phase Commit with Security Services: Using Distinctive Proofs to Relieve Fragile Communications}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {217--228}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p217-228.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SunFZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SunQBY17, author = {Minhong Sun and Yuan Qin and Jianrong Bao and Xutao Yu}, title = {{GPS} Spoofing Detection Based on Decision Fusion with a K-out-of-N Rule}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {670--674}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p670-674.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SunQBY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SunZF17, author = {Yang Sun and Hongfeng Zhu and Xueshuai Feng}, title = {A Novel and Concise Multi-receiver Protocol Based on Chaotic Maps with Privacy Protection}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {371--382}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p371-382.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SunZF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TaiC17, author = {Wei{-}Liang Tai and Ya{-}Fen Chang}, title = {Comments on a Secure Authentication Scheme for IoT and Cloud Servers}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {648--651}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p648-651.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TaiC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TangZ17, author = {Fei Tang and Yousheng Zhou}, title = {Policy-based Signatures for Predicates}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {811--822}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p811-822.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TangZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TarekOH17, author = {Mayada Tarek and Osama Ouda and Taher Hamza}, title = {Pre-image Resistant Cancelable Biometrics Scheme Using Bidirectional Memory Model}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {498--506}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p498-506.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TarekOH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TbatouAASG17, author = {Zakariae Tbatou and Ahmed Asimi and Younes Asimi and Yassine Sadqi and Azidine Guezzaz}, title = {A New Mutuel Kerberos Authentication Protocol for Distributed Systems}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {889--898}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p889-898.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TbatouAASG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ThiyagarajanG17, author = {Devi Thiyagarajan and R. Ganesan}, title = {Cryptographically imposed model for Efficient Multiple Keyword-based Search over Encrypted Data in Cloud by Secure Index using Bloom Filter and False Random Bit Generator}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {413--420}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p413-420.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ThiyagarajanG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TianPGP17, author = {Ye Tian and Yanbin Peng and Gaimei Gao and Xinguang Peng}, title = {Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {720--726}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p720-726.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TianPGP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TsaiLTH17, author = {Cheng{-}Yi Tsai and Chi{-}Yu Liu and Shyh{-}Chang Tsaur and Min{-}Shiang Hwang}, title = {A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {443--448}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p443-448.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TsaiLTH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WahballaWLIX17, author = {Osman Wahballa and Abubaker Wahaballa and Fagen Li and Idris Ibn Idris and Chunxiang Xu}, title = {Medical Image Encryption Scheme Based on Arnold Transformation and {ID-AK} Protocol}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {776--784}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p776-784.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WahballaWLIX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangFW17, author = {Yibing Wang and Jie Fang and Fuhu Wu}, title = {Application of Community Detection Algorithm with Link Clustering in Inhibition of Social Network Worms}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {3}, pages = {458--468}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p458-468.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangFW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangGYW17, author = {Fangwei Wang and Hongfeng Gao and Yong Yang and Changguang Wang}, title = {An {SVEIR} Defending Model with Partial Immunization for Worms}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {20--26}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p20-26.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangGYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangLZ17, author = {Junshe Wang and Jinliang Liu and Hongbin Zhang}, title = {Access Control Based Resource Allocation in Cloud Computing Environment}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {236--243}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p236-243.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangSH17, author = {Yu{-}Lun Wang and Jau{-}Ji Shen and Min{-}Shiang Hwang}, title = {An Improved Dual Image-based Reversible Hiding Technique Using {LSB} Matching}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {858--862}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p858-862.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangSH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangXCHXH17, author = {Caimei Wang and Yan Xiong and Wenjuan Cheng and Wenchao Huang and Huihua Xia and Jianmeng Huang}, title = {A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {794--803}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p794-803.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangXCHXH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangYLX17, author = {Yilei Wang and Dongjie Yan and Fagen Li and Hu Xiong}, title = {A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {623--630}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p623-630.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangYLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WeiL017, author = {Kuo{-}Jui Wei and Jung{-}San Lee and Bo Li}, title = {{SMP:} Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {60--71}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p60-71.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WeiL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WengC17, author = {I{-}Chun Weng and Tzung{-}Her Chen}, title = {A Novel Weighted Visual Cryptography Scheme with High Visual Quality}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {922--928}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p922-928.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WengC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WuCW17, author = {Min Wu and Jianhua Chen and Ruibing Wang}, title = {An Enhanced Anonymous Password-based Authenticated Key Agreement Scheme with Formal Proof}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {785--793}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p785-793.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WuCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/XuW17, author = {Yuwei Xu and Chuankun Wu}, title = {Further Characterization of {H} Vectorial Functions}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {899--903}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p899-903.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/XuW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/YaoY17, author = {Yifei Yao and Fanhua Yu}, title = {Privacy-preserving Similarity Sorting in Multi-party Model}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {851--857}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p851-857.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/YaoY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/YuanLGHW17, author = {Lifeng Yuan and Mingchu Li and Cheng Guo and Wei{-}Tong Hu and Zhi{-}Hui Wang}, title = {A Verifiable E-voting Scheme with Secret Sharing}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {2}, pages = {260--271}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p260-271.pdf}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/YuanLGHW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangHQH17, author = {Qiu{-}Yu Zhang and Wen{-}Jin Hu and Si{-}Bin Qiao and Yi{-}Bo Huang}, title = {Speech Perceptual Hashing Authentication Algorithm Based on Spectral Subtraction and Energy to Entropy Ratio}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {752--760}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p752-760.pdf}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangHQH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangHWLG17, author = {Jianjun Zhang and Huajun Huang and Lucai Wang and HaiJun Lin and Deng Gao}, title = {Coverless Text Information Hiding Method Using the Frequent Words Hash}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {1016--1023}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1016-1023.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangHWLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangLX17, author = {Jianhong Zhang and Pengyan Li and Min Xu}, title = {On the Security of an Mutual Verifiable Provable Data Auditing in Public Cloud Storage}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {605--612}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p605-612.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangS17, author = {Qianying Zhang and Zhiping Shi}, title = {A New Way to Prevent {UKS} Attacks Using Hardware Security Chips}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {5}, pages = {823--831}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p823-831.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhaoFCQX17, author = {Yang Zhao and Pengcheng Fan and Haoting Cai and Zhiguang Qin and Hu Xiong}, title = {Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {6}, pages = {1044--1052}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1044-1052.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhaoFCQX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhaoLL017, author = {Quanyu Zhao and Yining Liu and Gao Liu and Chin{-}Chen Chang}, title = {A Novel Micropayment Scheme with Variable Denomination}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {85--90}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p85-90.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhaoLL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhuZ17, author = {Hongfeng Zhu and Yifeng Zhang}, title = {An Improved Two-party Password-Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {487--497}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p487-497.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhuZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.