Search dblp for Publications

export results for "toc:db/journals/ijnsec/ijnsec19.bht:"

 download as .bib file

@article{DBLP:journals/ijnsec/00020C17,
  author       = {Yanjun Liu and
                  Chin{-}Chen Chang and
                  Shih{-}Chang Chang},
  title        = {An Efficient and Secure Smart Card Based Password Authentication Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {1--10},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p1-10.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/00020C17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AbdallaHWARQ17,
  author       = {Hisham Abdalla and
                  Hu Xiong and
                  Abubaker Wahaballa and
                  Ahmed Abdalla Ali and
                  Mohammed Ramadan and
                  Zhiguang Qin},
  title        = {Integrating the Functional Encryption and Proxy Re-cryptography to
                  Secure {DRM} Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {27--38},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p27-38.pdf},
  timestamp    = {Mon, 15 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AbdallaHWARQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AhmedZ17,
  author       = {Abdulghani Ali Ahmed and
                  Noorul Ahlami Kamarul Zaman},
  title        = {Attack Intention Recognition: {A} Review},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {244--250},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p244-250.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AhmedZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ArthiR17,
  author       = {K. Arthi and
                  M. Chandra Mouli Reddy},
  title        = {A Secure and Efficient Privacy-Preserving Attribute Matchmaking Protocol
                  for Mobile Social Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {421--429},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p421-429.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ArthiR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AzrourFO17,
  author       = {Mourade Azrour and
                  Yousef Farhaoui and
                  Mohammed Ouanan},
  title        = {A New Authentication and Key Exchange Protocol for Session Initiation
                  Protocol Using Smart Card},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {870--879},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p870-879.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AzrourFO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BaishyaHB17,
  author       = {Ram Charan Baishya and
                  Nazrul Hoque and
                  Dhruba Kumar Bhattacharyya},
  title        = {DDoS Attack Detection Using Unique Source {IP} Deviation},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {929--939},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p929-939.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BaishyaHB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BalusamyKAC17,
  author       = {Balamurugan Balusamy and
                  P. Venkata Krishna and
                  G. S. Tamizh Arasi and
                  Victor Chang},
  title        = {A Secured Access Control Technique for Cloud Computing Environment
                  Using Attribute Based Hierarchical Structure and Token Granting System},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {559--572},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p559-572.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BalusamyKAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BehalK17,
  author       = {Sunny Behal and
                  Krishan Kumar},
  title        = {Characterization and Comparison of DDoS Attack Tools and Traffic Generators:
                  {A} Review},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {383--393},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p383-393.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BehalK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BehalKS17,
  author       = {Sunny Behal and
                  Krishan Kumar and
                  Monika Sachdeva},
  title        = {Discriminating Flash Events from DDoS Attacks: {A} Comprehensive Review},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {734--741},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p734-741.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BehalKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BrindhaJ17,
  author       = {K. Brindha and
                  N. Jeyanthi},
  title        = {Securing Portable Document Format File Using Extended Visual Cryptography
                  to Protect Cloud Data Storage},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {684--693},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p684-693.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BrindhaJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CaiRJ17,
  author       = {Jianxing Cai and
                  Yanli Ren and
                  Tiejin Jiang},
  title        = {Verifiable Outsourcing Computation of Modular Exponentiations with
                  Single Server},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {449--457},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p449-457.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CaiRJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CaoL17,
  author       = {Zhengjun Cao and
                  Lihua Liu},
  title        = {A Note on Two Schemes for Secure Outsourcing of Linear Programming},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {323--326},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p323-326.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CaoL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CaoL17a,
  author       = {Zhengjun Cao and
                  Lihua Liu},
  title        = {The Paillier's Cryptosystem and Some Variants Revisited},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {91--98},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p91-98.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CaoL17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CaoLM17,
  author       = {Zhengjun Cao and
                  Lihua Liu and
                  Olivier Markowitch},
  title        = {Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable
                  Outsourcing of Key Updates},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {950--954},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p950-954.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CaoLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChandeLL17,
  author       = {Manoj Kumar Chande and
                  Cheng{-}Chi Lee and
                  Chun{-}Ta Li},
  title        = {Message Recovery via an Efficient Multi-Proxy Signature With Self-certified
                  Keys},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {340--346},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p340-346.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChandeLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChaoTH17,
  author       = {Wan{-}Yu Chao and
                  Cheng{-}Yi Tsai and
                  Min{-}Shiang Hwang},
  title        = {An Improved Key-Management Scheme for Hierarchical Access Control},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {639--643},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p639-643.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChaoTH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CharifDG17,
  author       = {Khalid Charif and
                  Ahmed Drissi and
                  Zine El Abidine Guennoun},
  title        = {A Pseudo Random Number Generator Based on Chaotic Billiards},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {479--486},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p479-486.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CharifDG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChattopadhyayNM17,
  author       = {Arup Kumar Chattopadhyay and
                  Amitava Nag and
                  Koushik Majumder},
  title        = {Secure Data Outsourcing on Cloud Using Secret Sharing Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {912--921},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p912-921.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChattopadhyayNM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenE17,
  author       = {Zhixiong Chen and
                  Vladimir Edemskiy},
  title        = {Linear Complexity of Quaternary Sequences Over {Z4} Derived From Generalized
                  Cyclotomic Classes Modulo 2p},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {613--622},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p613-622.pdf},
  timestamp    = {Mon, 07 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChenE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenYH17,
  author       = {Jong{-}Shin Chen and
                  Cheng{-}Ying Yang and
                  Min{-}Shiang Hwang},
  title        = {The Capacity Analysis in the Secure Cooperative Communication System},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {863--869},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p863-869.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChenYH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenYH17a,
  author       = {Shih{-}Ming Chen and
                  Ching{-}Rong Yang and
                  Min{-}Shiang Hwang},
  title        = {Using a New Structure in Group Key Management for Pay-TV},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {112--117},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p112-117.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChenYH17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenYXLL17,
  author       = {Cai{-}Sen Chen and
                  Xi Yu and
                  Yang{-}Xia Xiang and
                  Xiong Li and
                  Tengrun Li},
  title        = {An Improved {DPA} Attack on {DES} with Forth and Back Random Round
                  Algorithm},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {285--294},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p285-294.pdf},
  timestamp    = {Sun, 07 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChenYXLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenZXY17,
  author       = {Yang Chen and
                  Yang Zhao and
                  Hu Xiong and
                  Feng Yue},
  title        = {A Certificateless Strong Designated Verifier Signature Scheme with
                  Non-delegatability},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {573--582},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p573-582.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChenZXY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChengF17,
  author       = {Binlin Cheng and
                  Jianming Fu},
  title        = {Social Bots Detection on Mobile Social Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {163--166},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p163-166.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChengF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ContractorP17,
  author       = {Dipen Contractor and
                  Dhiren R. Patel},
  title        = {Accountability in Cloud Computing by Means of Chain of Trust},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {251--259},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p251-259.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ContractorP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/DengHQ17,
  author       = {Lunzhi Deng and
                  Huawei Huang and
                  Yunyun Qu},
  title        = {Identity Based Proxy Signature from {RSA} without Pairings},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {229--235},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p229-235.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/DengHQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/DongWZ17,
  author       = {Rui{-}Hong Dong and
                  Dong{-}Fang Wu and
                  Qiu{-}Yu Zhang},
  title        = {The Integrated Artificial Immune Intrusion Detection Model Based on
                  Decision-theoretic Rough Set},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {880--888},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p880-888.pdf},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/DongWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/DrissiA17,
  author       = {Ahmed Drissi and
                  Ahmed Asimi},
  title        = {Behavioral and Security Study of the {OHFGC} Hash Function},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {335--339},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p335-339.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/DrissiA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Farhaoui17,
  author       = {Yousef Farhaoui},
  title        = {Design and Implementation of an Intrusion Prevention System Inspired
                  Immune Systems},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {675--683},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p675-683.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Farhaoui17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/FuNL17,
  author       = {Xingbing Fu and
                  Xunyun Nie and
                  Fagen Li},
  title        = {Outsource the Ciphertext Decryption of Inner Product Predicate Encryption
                  Scheme Based on Prime Order Bilinear Map},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {313--322},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p313-322.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/FuNL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GaoHGC17,
  author       = {Hang Gao and
                  Mengting Hu and
                  Tiegang Gao and
                  Renhong Cheng},
  title        = {Double Verifiable Lossless Secret Sharing Based on Hyper-chaos Generated
                  Random Grid},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {1005--1015},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1005-1015.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GaoHGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GoswamiHBK17,
  author       = {Swaswati Goswami and
                  Nazrul Hoque and
                  Dhruba K. Bhattacharyya and
                  Jugal Kalita},
  title        = {An Unsupervised Method for Detection of {XSS} Attack},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {761--775},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p761-775.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GoswamiHBK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GuoS17,
  author       = {Rui Guo and
                  Huixian Shi},
  title        = {Confidentiality-Preserving Personal Health Records in Tele-Healthcare
                  System Using Authenticated Certificateless Encryption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {995--1004},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p995-1004.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GuoS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HamzaSNQX17,
  author       = {Mohamed Ali Hamza and
                  Jianfei Sun and
                  Xuyun Nie and
                  Zhiquan Qin and
                  Hu Xiong},
  title        = {Revocable {ABE} with Bounded Ciphertext in Cloud Computing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {973--983},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p973-983.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HamzaSNQX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HanXL17,
  author       = {Lidong Han and
                  Qi Xie and
                  Wenhao Liu},
  title        = {An Improved Biometric Based Authentication Scheme with User Anonymity
                  Using Elliptic Curve Cryptosystem},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {469--478},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p469-478.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HanXL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HashemiH17,
  author       = {Seyed Mahmood Hashemi and
                  Jingsha He},
  title        = {An Evolutionary Multi-objective Approach for Modelling Network Security},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {528--536},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p528-536.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HashemiH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HashemiHB17,
  author       = {Seyed Mahmood Hashemi and
                  Jingsha He and
                  Alireza Ebrahimi Basabi},
  title        = {Multi-objective Optimization for Computer Security and Privacy},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {394--405},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p394-405.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HashemiHB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HassounaBB17,
  author       = {Mohammed Hassouna and
                  Bazara I. A. Barry and
                  Eihab Bashier},
  title        = {A New Level 3 Trust Hierarchal Certificateless Public Key Cryptography
                  Scheme in the Random Oracle Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {551--558},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p551-558.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HassounaBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HeYXQ17,
  author       = {Libo He and
                  Chen Yuan and
                  Hu Xiong and
                  Zhiguang Qin},
  title        = {An Efficient and Provably Secure Certificateless Key Insulated Encryption
                  with Applications to Mobile Internet},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {940--949},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p940-949.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HeYXQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Hiranvanichakorn17,
  author       = {Pipat Hiranvanichakorn},
  title        = {Provably Authenticated Group Key Agreement Based on Braid Groups -
                  The Dynamic Case},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {517--527},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p517-527.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Hiranvanichakorn17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HouW17,
  author       = {Guifa Hou and
                  Zhijie Wang},
  title        = {A Robust and Efficient Remote Authentication Scheme from Elliptic
                  Curve Cryptosystem},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {904--911},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p904-911.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HouW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuG17,
  author       = {Peng Hu and
                  Haiying Gao},
  title        = {A Key-Policy Attribute-based Encryption Scheme for General Circuit
                  from Bilinear Maps},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {704--710},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p704-710.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HuG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Ibrahim17,
  author       = {Maged Hamada Ibrahim},
  title        = {SecureCoin: {A} Robust Secure and Efficient Protocol for Anonymous
                  Bitcoin Ecosystem},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {295--312},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p295-312.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Ibrahim17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/IbrahimHS17,
  author       = {Safi Ibrahim and
                  Mohamed Hamdy and
                  Eman Shaaban},
  title        = {Towards an Optimum Authentication Service Allocation and Availability
                  in VANETs},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {955--965},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p955-965.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/IbrahimHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JabbarA17,
  author       = {Ihsan Jabbar and
                  Saad Najim Alsaad},
  title        = {Design and Implementation of Secure Remote e-Voting System Using Homomorphic
                  Encryption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {694--703},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p694-703.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JabbarA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JeyaprakashM17,
  author       = {Thangakumar Jeyaprakash and
                  Rajeswari Mukesh},
  title        = {A New Trusted Routing Protocol for Vehicular Ad Hoc Networks Using
                  Trusted Metrics},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {537--545},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p537-545.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JeyaprakashM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JiangSK17,
  author       = {Feng Jiang and
                  Paul Salama and
                  Brian King},
  title        = {A Public-Key Approach of Selective Encryption for Images},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {118--126},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p118-126.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JiangSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JinL0WL17,
  author       = {Qiang Jin and
                  Zhihong Li and
                  Chin{-}Chen Chang and
                  Anhong Wang and
                  Li Liu},
  title        = {Minimizing Turtle-Shell Matrix Based Stego Image Distortion Using
                  Particle Swarm Optimization},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {154--162},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p154-162.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JinL0WL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JinL17,
  author       = {Cong Jin and
                  Hui Liu},
  title        = {A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum
                  Chaotic},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {347--357},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p347-357.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JinL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JinW17,
  author       = {Cong Jin and
                  Xiaoyan Wang},
  title        = {Propagation Model with Varying Population Size of Removable Memory
                  Device Virus},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {507--516},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p507-516.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JinW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JinZL17,
  author       = {Zhengping Jin and
                  Hong Zhang and
                  Zhongxian Li},
  title        = {Security on a Knapsack-Type Encryption Scheme Based Upon Hybrid-Model
                  Assumption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {644--647},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p644-647.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JinZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KaiwartyaPPSAR17,
  author       = {Omprakash Kaiwartya and
                  Mukesh Prasad and
                  Shiv Prakash and
                  Durgesh Samadhiya and
                  Abdul Hanan Abdullah and
                  Syed Othmawi Abd Rahman},
  title        = {An Investigation on Biometric Internet Security},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {167--176},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p167-176.pdf},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KaiwartyaPPSAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KhanR17,
  author       = {Asif Uddin Khan and
                  Bikram Kesari Ratha},
  title        = {A Secure Strong Designated Verifier Signature Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {599--604},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p599-604.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KhanR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KhummaneeT17,
  author       = {Suchart Khummanee and
                  Kitt Tientanopajai},
  title        = {High-speed Firewall Rule Verification with {O(1)} Worst-case Access
                  Time},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {72--84},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p72-84.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KhummaneeT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Kuacharoen17,
  author       = {Pramote Kuacharoen},
  title        = {An Anti-Phishing Password Authentication Protocol},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {711--719},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p711-719.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Kuacharoen17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LanLYT17,
  author       = {Caihui Lan and
                  Haifeng Li and
                  Shoulin Yin and
                  Lin Teng},
  title        = {A New Security Cloud Storage Data Encryption Scheme Based on Identity
                  Proxy Re-encryption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {804--810},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p804-810.pdf},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LanLYT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LinL17,
  author       = {Iuon{-}Chang Lin and
                  Tzu{-}Chun Liao},
  title        = {A Survey of Blockchain Security Issues and Challenges},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {653--659},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p653-659.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LinL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LingLYH17,
  author       = {Chung{-}Huei Ling and
                  Cheng{-}Chi Lee and
                  Chou Chen Yang and
                  Min{-}Shiang Hwang},
  title        = {A Secure and Efficient One-time Password Authentication Scheme for
                  {WSN}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {177--181},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p177-181.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LingLYH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LingWC17,
  author       = {Jie Ling and
                  Ying Wang and
                  Weifeng Chen},
  title        = {An Improved Privacy Protection Security Protocol Based on {NFC}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {39--46},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p39-46.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LingWC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Liu17,
  author       = {Chenglian Liu},
  title        = {A Study of Relationship Among Goldbach Conjecture, Twin Prime and
                  Fibonacci Number},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {406--412},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p406-412.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Liu17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuWCL17,
  author       = {Li Liu and
                  Anhong Wang and
                  Chin{-}Chen Chang and
                  Zhihong Li},
  title        = {A Secret Image Sharing with Deep-steganography and Two-stage Authentication
                  Based on Matrix Encoding},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {327--334},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p327-334.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiuWCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuY17,
  author       = {Liang Liu and
                  Jun Ye},
  title        = {A Homomorphic Universal Re-encryptor for Identity-based Encryption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {11--19},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p11-19.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiuY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuZ0SW17,
  author       = {Dan Liu and
                  Shun Zhang and
                  Hong Zhong and
                  Runhua Shi and
                  Yimin Wang},
  title        = {An Efficient ID-based Online/Offline Signature Scheme without Key
                  Escrow},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {127--137},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p127-137.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiuZ0SW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LuoWH17,
  author       = {Ming Luo and
                  Yuwei Wan and
                  Donghua Huang},
  title        = {Certificateless Hybrid Signcryption Scheme with Known Session-Specific
                  Temporary Information Security},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {966--972},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p966-972.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LuoWH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LuoYWSL17,
  author       = {Zhi{-}yong Luo and
                  Bo You and
                  Peng Wang and
                  Jie Su and
                  Yi Liang},
  title        = {Analysis and Optimization of System Intrusion Tolerance Capacity Based
                  on Markov},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {1036--1043},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1036-1043.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LuoYWSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LuongV17,
  author       = {Thai{-}Ngoc Luong and
                  Thanh Tu Vo},
  title        = {Whirlwind: {A} New Method to Attack Routing Protocol in Mobile Ad
                  Hoc Network},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {832--838},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p832-838.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LuongV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Ma17,
  author       = {Yanna Ma},
  title        = {{NFC} Communications-based Mutual Authentication Scheme for the Internet
                  of Things},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {631--638},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p631-638.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Ma17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MaPL17,
  author       = {Hua Ma and
                  Ting Peng and
                  Zhenhua Liu},
  title        = {Directly Revocable and Verifiable Key-Policy Attribute-based Encryption
                  for Large Universe},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {272--284},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p272-284.pdf},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MaPL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MalekzadehA17,
  author       = {Mina Malekzadeh and
                  Moghis Ashrostaghi},
  title        = {{COL-MOD:} {A} New Module to Quantify the Weight of Damage Incurred
                  by Collision Attacks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {583--592},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p583-592.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MalekzadehA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MaoC17,
  author       = {Qian Mao and
                  Chin{-}Chen Chang},
  title        = {Turbo Unequal Error Protection Codes with Multiple Protection Levels},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {205--216},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p205-216.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MaoC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MasudSASH17,
  author       = {Mohd Zaki Mas'ud and
                  Shahrin Sahib and
                  Mohd Faizal Abdollah and
                  Siti Rahayu Selamat and
                  Choo Yun Huoy},
  title        = {A Comparative Study on Feature Selection Method for N-gram Mobile
                  Malware Detection},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {727--733},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p727-733.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MasudSASH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MengHYNW17,
  author       = {Bo Meng and
                  Chin{-}Tser Huang and
                  Yitong Yang and
                  Leyuan Niu and
                  Dejun Wang},
  title        = {Automatic Generation of Security Protocol Implementations Written
                  in Java from Abstract Specifications Proved in the Computational Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {138--153},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p138-153.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MengHYNW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MengY17,
  author       = {Ruifang Meng and
                  Tongjiang Yan},
  title        = {New Constructions of Binary Interleaved Sequences with Low Autocorrelation},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {546--550},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p546-550.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MengY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ModiPSOJ17,
  author       = {Jayam Modi and
                  Manav Prajapati and
                  Abhinav Sharma and
                  Ravi Ojha and
                  Devesh Jinwala},
  title        = {A Secure Communication Model for Expressive Access Control Using {CP-ABE}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {193--204},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p193-204.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ModiPSOJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MoonLJW17,
  author       = {Jongho Moon and
                  Donghoon Lee and
                  Jaewook Jung and
                  Dongho Won},
  title        = {Improvement of Efficient and Secure Smart Card Based Password Authentication
                  Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {1053--1061},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1053-1061.pdf},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MoonLJW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/NiXQ17,
  author       = {Sang Ni and
                  Mengbo Xie and
                  Quan Qian},
  title        = {Clustering Based K-anonymity Algorithm for Privacy Preservation},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {1062--1071},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1062-1071.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/NiXQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ParveesSB17,
  author       = {M. Y. Mohamed Parvees and
                  J. Abdul Samath and
                  B. Parameswaran Bose},
  title        = {Protecting Large Size Medical Images with Logistic Map Using Dynamic
                  Parameters and Key Image},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {984--994},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p984-994.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ParveesSB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PopoolaA17,
  author       = {Ebenezer Popoola and
                  Aderemi Oluyinka Adewumi},
  title        = {Efficient Feature Selection Technique for Network Intrusion Detection
                  System Using Discrete Differential Evolution and Decision},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {660--669},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p660-669.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PopoolaA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PraveenkumarTRA17,
  author       = {Padmapriya Praveenkumar and
                  Karuppuswamy Thenmozhi and
                  John Bosco Balaguru Rayappan and
                  Rengarajan Amirtharajan},
  title        = {Mojette (d) Secret Image "SEDIH" in an Encrypted Double Image - {A}
                  Histo Approach},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {47--59},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p47-59.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PraveenkumarTRA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RG17,
  author       = {Kavitha R and
                  Padmavathi G},
  title        = {Advanced Random Time Queue Blocking for Effective Protection of Application
                  Servers Against Low-Rate DoS Attacks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {1024--1035},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1024-1035.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RajendranD17,
  author       = {Sujarani Rajendran and
                  Manivannan Doraipandian},
  title        = {Chaotic Map Based Random Image Steganography Using {LSB} Technique},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {593--598},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p593-598.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RajendranD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RaoS17,
  author       = {Udai Pratap Rao and
                  Nikhil Kumar Singh},
  title        = {Weighted Role Based Data Dependency Approach for Intrusion Detection
                  in Database},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {358--370},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p358-370.pdf},
  timestamp    = {Fri, 25 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RaoS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RenZW17,
  author       = {Fang Ren and
                  Dong Zheng and
                  WeiJing Wang},
  title        = {An Efficient Code Based Digital Signature Algorithm},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {1072--1079},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1072-1079.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RenZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SampangiS17,
  author       = {Raghav V. Sampangi and
                  Srinivas Sampalli},
  title        = {Metamorphic Framework for Key Management and Authentication in Resource-Constrained
                  Wireless Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {430--442},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p430-442.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SampangiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ShahA17,
  author       = {Vrushank M. Shah and
                  A. K. Agarwal},
  title        = {Reliable Alert Fusion of Multiple Intrusion Detection Systems},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {182--192},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p182-192.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ShahA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Sheu17,
  author       = {Jyh{-}Jian Sheu},
  title        = {Distinguishing Medical Web Pages from Pornographic Ones: An Efficient
                  Pornography Websites Filtering Method},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {839--850},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p839-850.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Sheu17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SinghJ17,
  author       = {Umesh Kumar Singh and
                  Chanchala Joshi},
  title        = {Information Security Risk Management Framework for University Computing
                  Environment},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {742--751},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p742-751.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SinghJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SomsukT17,
  author       = {Kritsanapong Somsuk and
                  Kitt Tientanopajai},
  title        = {An Improvement of Fermat's Factorization by Considering the Last m
                  Digits of Modulus to Decrease Computation Time},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {99--111},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p99-111.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SomsukT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SunFZ17,
  author       = {Yang Sun and
                  Xueshuai Feng and
                  Hongfeng Zhu},
  title        = {Two-phase Commit with Security Services: Using Distinctive Proofs
                  to Relieve Fragile Communications},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {217--228},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p217-228.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SunFZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SunQBY17,
  author       = {Minhong Sun and
                  Yuan Qin and
                  Jianrong Bao and
                  Xutao Yu},
  title        = {{GPS} Spoofing Detection Based on Decision Fusion with a K-out-of-N
                  Rule},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {670--674},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p670-674.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SunQBY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SunZF17,
  author       = {Yang Sun and
                  Hongfeng Zhu and
                  Xueshuai Feng},
  title        = {A Novel and Concise Multi-receiver Protocol Based on Chaotic Maps
                  with Privacy Protection},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {371--382},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p371-382.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SunZF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TaiC17,
  author       = {Wei{-}Liang Tai and
                  Ya{-}Fen Chang},
  title        = {Comments on a Secure Authentication Scheme for IoT and Cloud Servers},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {648--651},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p648-651.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TaiC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TangZ17,
  author       = {Fei Tang and
                  Yousheng Zhou},
  title        = {Policy-based Signatures for Predicates},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {811--822},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p811-822.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TangZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TarekOH17,
  author       = {Mayada Tarek and
                  Osama Ouda and
                  Taher Hamza},
  title        = {Pre-image Resistant Cancelable Biometrics Scheme Using Bidirectional
                  Memory Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {498--506},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p498-506.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TarekOH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TbatouAASG17,
  author       = {Zakariae Tbatou and
                  Ahmed Asimi and
                  Younes Asimi and
                  Yassine Sadqi and
                  Azidine Guezzaz},
  title        = {A New Mutuel Kerberos Authentication Protocol for Distributed Systems},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {889--898},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p889-898.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TbatouAASG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ThiyagarajanG17,
  author       = {Devi Thiyagarajan and
                  R. Ganesan},
  title        = {Cryptographically imposed model for Efficient Multiple Keyword-based
                  Search over Encrypted Data in Cloud by Secure Index using Bloom Filter
                  and False Random Bit Generator},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {413--420},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p413-420.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ThiyagarajanG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TianPGP17,
  author       = {Ye Tian and
                  Yanbin Peng and
                  Gaimei Gao and
                  Xinguang Peng},
  title        = {Role-based Access Control for Body Area Networks Using Attribute-based
                  Encryption in Cloud Storage},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {720--726},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p720-726.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TianPGP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TsaiLTH17,
  author       = {Cheng{-}Yi Tsai and
                  Chi{-}Yu Liu and
                  Shyh{-}Chang Tsaur and
                  Min{-}Shiang Hwang},
  title        = {A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring
                  and Discrete Logarithms},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {443--448},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p443-448.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TsaiLTH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WahballaWLIX17,
  author       = {Osman Wahballa and
                  Abubaker Wahaballa and
                  Fagen Li and
                  Idris Ibn Idris and
                  Chunxiang Xu},
  title        = {Medical Image Encryption Scheme Based on Arnold Transformation and
                  {ID-AK} Protocol},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {776--784},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p776-784.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WahballaWLIX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangFW17,
  author       = {Yibing Wang and
                  Jie Fang and
                  Fuhu Wu},
  title        = {Application of Community Detection Algorithm with Link Clustering
                  in Inhibition of Social Network Worms},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {458--468},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n3/ijns-2017-v19-n3-p458-468.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangFW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangGYW17,
  author       = {Fangwei Wang and
                  Hongfeng Gao and
                  Yong Yang and
                  Changguang Wang},
  title        = {An {SVEIR} Defending Model with Partial Immunization for Worms},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {20--26},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p20-26.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangGYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangLZ17,
  author       = {Junshe Wang and
                  Jinliang Liu and
                  Hongbin Zhang},
  title        = {Access Control Based Resource Allocation in Cloud Computing Environment},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {236--243},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p236-243.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangSH17,
  author       = {Yu{-}Lun Wang and
                  Jau{-}Ji Shen and
                  Min{-}Shiang Hwang},
  title        = {An Improved Dual Image-based Reversible Hiding Technique Using {LSB}
                  Matching},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {858--862},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p858-862.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangSH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangXCHXH17,
  author       = {Caimei Wang and
                  Yan Xiong and
                  Wenjuan Cheng and
                  Wenchao Huang and
                  Huihua Xia and
                  Jianmeng Huang},
  title        = {A General Formal Framework of Analyzing Selective Disclosure Attribute-Based
                  Credential Systems},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {794--803},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p794-803.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangXCHXH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangYLX17,
  author       = {Yilei Wang and
                  Dongjie Yan and
                  Fagen Li and
                  Hu Xiong},
  title        = {A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud
                  Environment},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {623--630},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p623-630.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangYLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WeiL017,
  author       = {Kuo{-}Jui Wei and
                  Jung{-}San Lee and
                  Bo Li},
  title        = {{SMP:} Scalable Multicast Protocol for Granting Authority in Heterogeneous
                  Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {60--71},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p60-71.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WeiL017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WengC17,
  author       = {I{-}Chun Weng and
                  Tzung{-}Her Chen},
  title        = {A Novel Weighted Visual Cryptography Scheme with High Visual Quality},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {922--928},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p922-928.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WengC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WuCW17,
  author       = {Min Wu and
                  Jianhua Chen and
                  Ruibing Wang},
  title        = {An Enhanced Anonymous Password-based Authenticated Key Agreement Scheme
                  with Formal Proof},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {785--793},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p785-793.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WuCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XuW17,
  author       = {Yuwei Xu and
                  Chuankun Wu},
  title        = {Further Characterization of {H} Vectorial Functions},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {899--903},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p899-903.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XuW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/YaoY17,
  author       = {Yifei Yao and
                  Fanhua Yu},
  title        = {Privacy-preserving Similarity Sorting in Multi-party Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {851--857},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p851-857.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/YaoY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/YuanLGHW17,
  author       = {Lifeng Yuan and
                  Mingchu Li and
                  Cheng Guo and
                  Wei{-}Tong Hu and
                  Zhi{-}Hui Wang},
  title        = {A Verifiable E-voting Scheme with Secret Sharing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {260--271},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n2/ijns-2017-v19-n2-p260-271.pdf},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/YuanLGHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangHQH17,
  author       = {Qiu{-}Yu Zhang and
                  Wen{-}Jin Hu and
                  Si{-}Bin Qiao and
                  Yi{-}Bo Huang},
  title        = {Speech Perceptual Hashing Authentication Algorithm Based on Spectral
                  Subtraction and Energy to Entropy Ratio},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {752--760},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p752-760.pdf},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangHQH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangHWLG17,
  author       = {Jianjun Zhang and
                  Huajun Huang and
                  Lucai Wang and
                  HaiJun Lin and
                  Deng Gao},
  title        = {Coverless Text Information Hiding Method Using the Frequent Words
                  Hash},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {1016--1023},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1016-1023.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangHWLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangLX17,
  author       = {Jianhong Zhang and
                  Pengyan Li and
                  Min Xu},
  title        = {On the Security of an Mutual Verifiable Provable Data Auditing in
                  Public Cloud Storage},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {605--612},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p605-612.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangS17,
  author       = {Qianying Zhang and
                  Zhiping Shi},
  title        = {A New Way to Prevent {UKS} Attacks Using Hardware Security Chips},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {823--831},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p823-831.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhaoFCQX17,
  author       = {Yang Zhao and
                  Pengcheng Fan and
                  Haoting Cai and
                  Zhiguang Qin and
                  Hu Xiong},
  title        = {Attribute-based Encryption with Non-Monotonic Access Structures Supporting
                  Fine-Grained Attribute Revocation in M-healthcare},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {1044--1052},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n6/ijns-2017-v19-n6-p1044-1052.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhaoFCQX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhaoLL017,
  author       = {Quanyu Zhao and
                  Yining Liu and
                  Gao Liu and
                  Chin{-}Chen Chang},
  title        = {A Novel Micropayment Scheme with Variable Denomination},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {85--90},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p85-90.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhaoLL017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhuZ17,
  author       = {Hongfeng Zhu and
                  Yifeng Zhang},
  title        = {An Improved Two-party Password-Authenticated Key Agreement Protocol
                  with Privacy Protection Based on Chaotic Maps},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {487--497},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p487-497.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhuZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics