


default search action
International Journal of Network Security, Volume 4
Volume 4, Number 1, January 2007
- Nan-I Wu, Min-Shiang Hwang:

Data Hiding: Current Status and Key Issues. 1-9 - Cungang Yang:

Designing of ORBAC Model For Secure Domain Environments. 10-16 - Shangping Zhong, Xueqi Cheng, Tierui Chen:

Data Hiding in a Kind of PDF Texts for Secret Communication. 17-26 - Alessandra Lumini, Loris Nanni:

When Fingerprints Are Combined with Iris - A Case Study: FVC2004 and CASIA. 27-34 - Ping Ding:

Central Manager: A Solution to Avoid Denial Of Service Attacks for Wireless LANs. 35-44 - Li Zhuang, J. D. Tygar, Rachna Dhamija:

Injecting Heterogeneity Through Protocol Randomization. 45-58 - Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Mamoru Maekawa:

Java Bytecode Dependence Analysis for Secure Information Flow. 59-68 - Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Kostas G. Anagnostakis, Jonathan M. Smith:

Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications. 69-80 - Nikolay A. Moldovyan, Peter A. Moldovyanu, Douglas H. Summerville:

On Software Implementation of Fast DDP-based Ciphers. 81-89 - Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa:

Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks. 90-98 - Jaewon Lee, Heeyoul Kim, Younho Lee, Seong-Min Hong, Hyunsoo Yoon:

Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field. 99-106 - Despoina Palaka, Petros Daras, Kosmas Petridis, Michael G. Strintzis:

A Novel Peer-to-peer Payment Protocol. 107-120
Volume 4, Number 2, March 2007
- Pin Lin, Wenling Wu, Chuankun Wu:

Security Analysis of Double Length Compression Function Based on Block Cipher. 121-127 - Brian J. Cacic, Ruizhong Wei:

Improving Indirect Key Management Scheme of Access Hierarchies. 128-137 - Pairat Thorncharoensri, Tianbing Xia, Yi Mu:

How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis. 138-148 - Xiaojian Tian, Robert W. Zhu, Duncan S. Wong:

Improved Efficient Remote User Authentication Schemes. 149-154 - Leon Pan:

A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7. 155-165 - Mahalingam Ramkumar:

Broadcast Authentication With Preferred Verifiers. 166-178 - Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin:

Distributed Cryptographic Computing on Grid. 179-186 - Amit K. Awasthi, Sunder Lal:

ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. 187-192 - Jiguo Li, Shuhong Wang:

New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key. 193-200 - Aneta Zwierko, Zbigniew Kotulski:

Integrity of mobile agents: a new approach. 201-211 - Magdy Saeb, Meer Hamza, Ahmed El-Shikh:

IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems. 212-226 - Wei Ren:

Pulsing RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks. 227-234 - Minho Kim, Çetin Kaya Koç:

Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme. 235-239
Volume 4, Number 3, May 2007
- Lin-Huang Chang, Che Lin Lo, Jui Jen Lo, Wei-Ting Liu, Chou Chen Yang:

Mobility Management with Distributed AAA Architecture. 241-247 - Rongxing Lu, Zhenfu Cao, Jun Shao:

On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification. 248-253 - Kannan Karthik, Dimitrios Hatzinakos:

Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit Plane for Multicast Content Protection. 254-265 - Xiangxue Li, Dong Zheng, Kefei Chen:

LFSR-based Signatures with Message Recovery. 266-270 - Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed:

ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications. 271-281 - Dayin Wang, Dongdai Lin, Wenling Wu:

Related-Mode Attacks on CTR Encryption Mode. 282-287 - Willy Susilo, Hiroaki Kikuchi:

Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner. 288-291 - Zonghua Zhang, Hong Shen, Yingpeng Sang:

An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection. 292-305 - Zhensong Liao, Hai Jin, Deqing Zou, Weizhong Qiang:

A Novel Approach to Hide Credentials. 306-311 - Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak:

Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings. 312-317 - Justin Zhijun Zhan, Stan Matwin:

Privacy-Preserving Data Mining in Electronic Surveys. 318-327 - Ajith Abraham, Crina Grosan, Carlos Martín-Vide:

Evolutionary Design of Intrusion Detection Programs. 328-339 - Paolo Dal Checco

, Francesco Bergadano, Davide Cavagnino, Pasquale Andrea Nesta, Michele Miraglia, Pier Luigi Zaccone:
Secure Logging for Irrefutable Administration. 340-347 - Debasis Giri, Parmeshwary Dayal Srivastava:

An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies. 348-354 - Tianjie Cao, Xianping Mao:

Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes. 355-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














