


default search action
International Journal of Network Security, Volume 12
Volume 12, Number 1, January 2011
- Chunbo Ma, Jun Ao:

Certificateless Group Oriented Signature Secure Against Key Replacement Attack. 1-6 - R. Rajaram Ramasamy, M. Amutha Prabakar:

Digital Signature Scheme with Message Recovery Using Knapsack-based ECC. 7-12 - Riham Abdellatif, Heba Kamal Aslan, Salwa H. El-Ramly:

New Real Time Multicast Authentication Protocol. 13-20 - Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:

Fault Attack, Countermeasures on Pairing Based Cryptography. 21-28 - Faisal Nabi:

Designing a Secure Framework Method for Secure Business Application Logic Integrity in e-Commerce Systems. 29-41 - Peyman Kabiri, Mehran Aghaei:

Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks. 42-49 - Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi:

Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor. 50-57 - Chi-Yu Liu, Cheng-Chi Lee, Tzu-Chun Lin:

Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme. 58-60
Volume 12, Number 2, March 2011
- Imane Aly Saroit, Said Fathy El-Zoghdy, Mostafa Matar:

A Scalable and Distributed Security Protocol for Multicast Communications. 61-74 - Mohammed Mana, Mohammed Feham, Boucif Amar Bensaber:

Trust Key Management Scheme for Wireless Body Area Networks. 75-83 - Chinniah Porkodi, Ramalingam Arumuganathan, Krishnasamy Vidya:

Multi-authority Electronic Voting Scheme Based on Elliptic Curves. 84-91 - Hu Xiong, Zhiguang Qin, Fagen Li:

A Certificateless Proxy Ring Signature Scheme with Provable Security. 92-106 - Garth V. Crosby, Lance Hester, Niki Pissinou:

Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks. 107-117 - Girraj Kumar Verma:

Probable Security Proof of A Blind Signature Scheme over Braid Groups. 118-120
Volume 12, Number 3, May 2011
- Hussein Al-Bahadili, Shakir M. Hussain, Ghassan Issa, Khaled El-Zayyat:

Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs. 121-129 - Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, Tsuyoshi Takagi:

Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings. 130-136 - S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari Bhat:

Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points. 137-150 - Ekambaram Kesavulu Reddy:

Elliptic Curve Cryptosystems and Side-channel Attacks. 151-158 - Eman El-Emam, Magdy Koutb, Hamdy M. Kelash, Osama S. Faragallah:

An Authentication Protocol Based on Kerberos 5. 159-170 - Fuw-Yi Yang, Cai-Ming Liao:

An Anonymous Auction Protocol Based on GDH Assumption. 171-177 - Shiang-Feng Tzeng, Cheng-Chi Lee, Tzu-Chun Lin:

A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy. 178-180

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














