


default search action
International Journal of Network Security, Volume 13
Volume 13, Number 1, July 2011
- Laszlo Gyongyosi, Sándor Imre:

Quantum Informational Divergence in Quantum Channel Security Analysis. 1-12 - Mina Malekzadeh, Abdul Azim Abdul Ghani, Shamala Subramaniam, Jalil M. Desa:

Validating Reliability of OMNeT++ in Wireless Networks DoS Attacks: Simulation vs. Testbed. 13-21 - Nikolay A. Moldovyan:

Blind Signature Protocols from Digital Signature Standards. 22-30 - Adesina S. Sodiya, Olusegun Folorunso, Saidat Adebukola Onashoga, Omoniyi Paul Ogunderu:

An Improved Semi-Global Alignment Algorithm for Masquerade Detection. 31-40 - Chin-Ling Chen, Yeong-Lin Lai, Chih-Cheng Chen, Yong-Yuan Deng, Yu-Cheng Hwang:

RFID Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards. 41-48 - Mohamed M. Nasreldin Rasslan:

A Stamped Hidden-signature Scheme Utilizing The Elliptic Curve Discrete Logarithm Problem. 49-57 - Debiao He, Jianhua Chen, Jin Hu:

Weaknesses of a Remote User Password Authentication Scheme Using Smart Card. 58-60
Volume 13, Number 2, September 2011
- Kitae Kim, Ikkwon Yie, Seongan Lim, Daehun Nyang:

Batch Verification and Finding Invalid Signatures in a Group Signature Scheme. 61-70 - Wei Hu, Kaiping Xue, Peilin Hong, Chuchu Wu:

ATCS: A Novel Anonymous and Traceable Communication Scheme for Vehicular Ad Hoc Networks. 71-78 - Tarek S. Sobh, Mohamed Ibrahiem Amer:

PGP Modification for Securing Digital Envelope Mail Using COM+ and Web Services. 79-91 - Marimuthu Rajaram, Thilagavathy Dorairaj Suresh:

An Interval-based Contributory Key Agreement. 92-97 - Sandeep K. Sood, Anil Kumar Sarje, Kuldip Singh:

Inverse Cookie-based Virtual Password Authentication Protocol. 98-108 - Celia Li, Zhuang Wang, Cungang Yang:

Secure Routing for Wireless Mesh Networks. 109-120
Volume 13, Number 3, November 2011
- Mohamed Salah Bouassida:

Authentication vs. Privacy within Vehicular Ad Hoc Networks. 121-134 - Ted Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung:

The Efficient Dual Receiver Cryptosystem and Its Applications. 135-151 - J. Udhayan, T. Hamsapriya:

Statistical Segregation Method to Minimize the False Detections During DDoS Attacks. 152-160 - Xingwen Zhao, Fangguo Zhang:

A New Type of ID-based Encryption System and Its Application to Pay-TV Systems. 161-166 - Manoj Kumar, Mridul Kumar Gupta, Saru Kumari:

An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks. 167-177 - Xingwen Zhao, Fangguo Zhang:

Analysis on Hu et al.'s Identity-based Broadcast Encryption. 178-180

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














