Forthcoming and Online First Articles

International Journal of Security and Networks

International Journal of Security and Networks (IJSN)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Security and Networks (1 paper in press)

Regular Issues

  • Secure Identity-Based Encryption: Overcoming the Key Escrow Challenge   Order a copy of this article
    by Khaleda Afroaz, Subba Rao Y.V., Rukma Rekha N 
    Abstract: Identity-based encryption (IBE) simplifies public key encryption overhead by eliminating the need for certificate authorities (CAs) to issue public keys. However, IBE suffers from the key escrow problem, where the private key generator (PKG) can access private keys. Existing solutions require additional trusted authorities or certificates. This paper presents a novel scheme that overcomes key escrow without certificates or extra trusted authorities. The scheme incorporates the receiver's public parameter during encryption, along with identity and public parameters from the PKG. To decrypt, the receiver needs the private key generated by the PKG and their private parameter, which is unknown to the PKG. This approach prevents PKG from decrypting messages. The proposed scheme is secure in the selective identity model and applicable in healthcare, MANETS, IoT, and M2M communications.
    Keywords: identity-based encryption; IBE; key escrow problem; private key generator; PKG.
    DOI: 10.1504/IJSN.2023.10060961