


default search action
International Journal of Network Security, Volume 5
Volume 5, Number 1, July 2007
- Iosif-Viorel Onut, Ali A. Ghorbani:

A Feature Classification Scheme For Network Intrusion Detection. 1-15 - Dayin Wang, Dongdai Lin, Wenling Wu:

Another Look at PMAC. 16-20 - Adam J. Rocke, Ronald F. DeMara, Simon Foo:

Evaluation of Distributed File Integrity Analyzers in the Presence of Tampering. 21-31 - Tsz-Yeung Wong, John Chi-Shing Lui, Man Hon Wong:

Markov Chain Modelling of the Probabilistic Packet Marking Algorithm. 32-40 - Ashish Patel, M. Shah, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi:

Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences. 41-50 - Bartlomiej Sieka, Ajay D. Kshemkalyani:

Establishing Authenticated Channels and Secure Identifiers in Ad-hoc Networks. 51-61 - Jianhong Zhang, Wei Zou:

On the Security of Huang-Chang Multi-signature Schemes. 62-65 - Peyman Kabiri, Ali A. Ghorbani:

A Rule-based Temporal Alert Correlation System. 66-72 - Yu Zhang, Li Lin, Jinpeng Huai:

Balancing Trust and Incentive in Peer-to-Peer Collaborative System. 73-81 - Rajavelu Srinivasan, Vaidehi V., K. N. Srivathsan, L. Ramesh Babu, C. Karunagaran:

SeReRoM: Secured Reliable Routing Scheme for Multicasting. 82-88 - Shi Cui, Pu Duan, Choong Wah Chan, Xiangguo Cheng:

An Efficient Identity-based Signature Scheme and Its Applications. 89-98 - Christos K. Dimitriadis, Siraj A. Shaikh:

A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions. 99-111 - Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi:

Statistical Attack Resilient Data Hiding. 112-120
Volume 5, Number 2, September 2007
- Yongliang Liu, Xiaolin Yang, Hongxun Yao, Wen Gao:

Novel Secure Communication Protocol for Conditional Access System. 121-127 - Ashraf D. Elbayoumy, Simon J. Shepherd:

Stream or Block Cipher for Securing VoIP? 128-133 - He Ge:

An Effective Method to Implement Group Signature with Revocation. 134-139 - Zhensong Liao, Yan Huang, Chisong Li:

Research on Data Hiding Capacity. 140-144 - Afrand Agah, Sajal K. Das:

Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach. 145-153 - Dong Zheng, Xiangxue Li, Kefei Chen:

Code-based Ring Signature Scheme. 154-157 - Anil Rawat, Prakash Dattatraya Vyavahare, Ashwani Kumar Ramani:

Enhanced DSR for MANET with Improved Secured Route Discovery and QoS. 158-166 - Liam Keliher:

Toward Provable Security Against Differential and Linear Cryptanalysis for Camellia and Related Ciphers. 167-175 - Xiao-Ming Lu, Dengguo Feng:

Security Proof of the Original SOK-IBS Scheme. 176-181 - Bo Yang, Hua Ma, Shenglin Zhu:

A Traitor Tracing Scheme Based on the RSA System. 182-186 - Lirong Dai, Kendra M. L. Cooper:

A Survey of Modeling and Analysis Approaches for Architecting Secure Software Systems. 187-198 - Joseph K. Liu, Duncan S. Wong:

A More Efficient Instantiation of Witness-Indistinguishable Signature. 199-204 - Chetan Nanjunda Mathur, K. P. Subbalakshmi:

A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices. 205-212 - Hasan Mohammed Hasan Husein, Bayoumi I. Bayoumi, Fathy Saad Holail, Bahaa Eldin M. Hasan, Mohammed Z. Abd El-Mageed:

A Genetic Algorithm for Cryptanalysis of DES-8. 213-219 - Zichen Li, C. F. Chong, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun:

An Attack on Libert et al.' s ID-based Undeniable Signature Scheme. 220-223 - Arshad Aziz, Nassar Ikram:

An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture. 224-232 - Ashraf D. Elbayoumy, Simon J. Shepherd:

A Comprehensive Secure VoIP Solution. 233-240
Volume 5, Number 3, November 2007
- Nawal A. El-Fishawy, Osama M. Abu Zaid:

Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms. 241-251 - Yongwei Wang, Venkata C. Giruka, Mukesh Singhal:

A Truthful Geographic Forwarding Algorithm for Ad-hoc Networks with Selfish Nodes. 252-263 - Boldizsár Bencsáth, István Vajda:

Efficient Directory Harvest Attacks and Countermeasures. 264-273 - K. P. Subbalakshmi, Rajarathnam Chandramouli, Nagarajan Ranganathan:

A Sequential Distinguisher for Covert Channel Identification. 274-282 - Rongxing Lu, Zhenfu Cao:

Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings. 283-287 - Mohamed Layouni, Jozef Hooman, Sofiène Tahar:

Formal Specification and Verification of the Intrusion-Tolerant Enclaves Protocol. 288-298 - Carlos Ribeiro, Paulo Ferreira:

A Policy-Oriented Language for Expressing Security Specifications. 299-316 - Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Duffy:

A Biometric Identity Based Signature Scheme. 317-326 - Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu:

Elliptic Curve Cryptography Based Wireless Authentication Protocol. 327-337 - Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto:

Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. 338-346 - Theodore Stergiou, Dimitrios L. Delivasilis:

Secure Error Signalling for Packet-Switched Networks - The Future Core Networks System Error Protocol. 347-358

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














