
International Journal of Security and Networks
2018 Vol.13 No.1
Pages | Title and author(s) |
1-9 | CRT based multi-secret sharing schemes: revisitedAppala Naidu Tentu; V.Ch. Venkaiah; V. Kamakshi Prasad DOI: 10.1504/IJSN.2018.090637 |
10-26 | A secure electronic voting protocol with a simple ballot's encryption functionWafa Neji; Kaouther Blibech; Narjes Ben Rajeb DOI: 10.1504/IJSN.2018.090649 |
27-41 | Evaluation of anonymous digital signatures for privacy-enhancing mobile applicationsLukas Malina; Petr Dzurenda; Jan Hajny DOI: 10.1504/IJSN.2018.090640 |
42-50 | An ID-based authentication scheme to achieve the security of smart cardNing Xu; Haiping Huang; Zhengtao Li; Yunqi Wang; Chao Sha DOI: 10.1504/IJSN.2018.090641 |
51-57 | An android malware static detection scheme based on cloud security structureBencheng Yu; Peisen Song; Xiaoyuan Xu DOI: 10.1504/IJSN.2018.090643 |
58-70 | Privacy-aware transmission scheme based on homomorphic proxy re-encryption for NDNXian Guo; Cheng Chen; Ma-Jiang Zhang; Aristide Ngaboyindekwe; Lai-Cheng Cao DOI: 10.1504/IJSN.2018.090646 |