Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Journal
    Name: I. J. Network Security
    Year: 2015
    Volume: 17
    Number: 1
    DBLP: db/journals/ijnsec/ijnsec17.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 25 of 81  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Changlu Lin, Yong Li 0002, Kewei Lv, Chin-Chen Chang.
    Ciphertext-Auditable Identity-Based Encryption.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li.
    Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Hoseb Dermanilian, Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab.
    Energy-Efficient Security for Voice over IP.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Yongtao Wang, Xiaonan Liu, Lulu Liang, Weiduan Feng, Guang Yang.
    Mitigating Key Escrow in Attribute-Based Encryption.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Yuan-Yu Tsai, Wen-Ching Huang, Bo-Feng Peng.
    An Efficient and Distortion-controllable Information Hiding Algorithm for 3D Polygonal Models with Adaptation.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Felipe dos Anjos Lima, Edward David Moreno, Dellano Oliveira D. dos Santos, Wanderson Roger Azevedo Dias.
    Energy Characterization of a Security Module in ARM Processor.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, Mingwu Zhang.
    Notes on Proxy Signcryption and Multi-proxy Signature Schemes.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Nashrul Hakiem, Mohammad Umar Siddiqi, Hashum Mohamed Rafiq.
    Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Hui-Feng Huang, Pin-Han Lin, Min-Hsuan Tsai.
    Convertible Multi-authenticated Encryption Scheme for Data Communication.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Boqing Xu, Qun Xiao, Zhenxing Qian, Chuan Qin.
    Unequal Protection Mechanism for Digital Speech Transmission Based on Turbo Codes.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Show item 1 to 25 of 81  

    Your query returned 81 matches in the database.