


default search action
International Journal of Network Security, Volume 2
Volume 2, Number 1, January 2006
- Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang:

3G and WLAN Interworking Security: Current Status and Key. 1-13 - Nicolas Sklavos, Panagiotis Souras:

Economic Models & Approaches in Information Security for Computer Networks. 14-20 - Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Siu-Ming Yiu, Bruce S. N. Cheung:

Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience. 21-28 - Xiangguo Cheng, Lifeng Guo, Xinmei Wang:

An Identity-based Mediated Signature Scheme from Bilinear Pairing. 29-33 - Younho Lee, Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon:

Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains. 34-40 - Lars R. Knudsen:

Small Size Hashes with Enhanced Security. 41-42 - Eric Jui-Lin Lu, Cheng-Jian Huang:

A Time-stamping Proxy Signature Scheme Using Time-stamping Service. 43-51 - Arslan Broemme:

A Risk Analysis Approach for Biometric Authentication Technology. 52-63 - Kim-Kwang Raymond Choo:

Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol. 64-68 - Lifeng Guo, Yang Liu:

Security Analysis and Improvement of Hsu et al. Threshold Proxy Signature Scheme. 69-72 - Sahadeo Padhye:

Cryptanalysis of Koyama Scheme. 73-80
Volume 2, Number 2, March 2006
- Min-Shiang Hwang, Pei-Chen Sung:

A Study of Micro-payment Based on One-way Hash Chain. 81-90 - Deholo Nali, Ali Miri, Carlisle M. Adams:

Traffic Filtering and Routing in Partially-Hidden Networks. 91-104 - Heeyoul Kim, Younho Lee, Seong-Min Hong, Hyunsoo Yoon:

Active Trial-and-error Attack on SASC Protocols. 105-110 - Yu Long, Kefei Chen:

Construction of Dynamic Threshold Decryption Scheme from Pairing. 111-113 - Nikolay A. Moldovyan, Alexander A. Moldovyan, Michael A. Eremeev, Nicolas Sklavos:

New Class of Cryptographic Primitives and Cipher Design for Networks Security. 114-125 - Yong Ding, Kwok-Wo Wong, Yu-Min Wang:

Joint Sparse Form of Window Three for Koblitz Curve. 126-130 - Animesh Patcha, Jung-Min Park:

A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks. 131-137 - Jolyon Clulow:

Cryptanalysis of the Secure Sessions from Weak Secrets Protocols. 138-140 - Adam J. Rocke, Ronald F. DeMara:

Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling. 141-149 - Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao:

An Access Control System with Time-constraint Using Support Vector Machines. 150-159
Volume 2, Number 3, May 2006
- Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, Yen-Ping Chu:

Reversible Watermarking: Current Status and Key Issues. 161-170 - Huafei Zhu:

Setup-driving Verifiably Committed Signatures Within Standard Complexity Mode. 171-181 - Rongxing Lu, Zhenfu Cao:

A Directed Signature Scheme Based on RSA Assumption. 182-186 - Nikolay A. Moldovyan, Alexander A. Moldovyan, Michael A. Eremeev:

A Class of Data-Dependent Operations. 187-204 - Kumar V. Mangipudi, Rajendra S. Katti:

A Hash-based Strong Password Authentication Protocol with User Anonymity. 205-209 - Zhi Zhou, Kin Choong Yow:

Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy. 210-218 - Hsien-Chou Liao, Yi-Hsiang Wang:

A Memory Symptom-based Virus Detection Approach. 219-227 - Cungang Yang:

Secure Internet Applications Based on Mobile Agents. 228-237 - Josef Pieprzyk, Xian-Mo Zhang:

Ideal Secret Sharing Schemes from Permutations. 238-244

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














