default search action
International Journal of Network Security, Volume 7
Volume 7, Number 1, July 2008
- Debabrata Nayak, Deepak B. Phatak, Ashutosh Saxena:
Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach. 1-14 - Kim-Kwang Raymond Choo:
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols. 15-23 - Kazimierz Kowalski, Mohsen Beheshti:
Improving Security Through Analysis of Log Files Intersections. 24-30 - Guido Marco Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi:
Parallel Hardware Architectures for the Cryptographic Tate Pairing. 31-37 - Jianqin Zhou:
Fast Algorithms for Determining the Minimal Polynomials of Sequences with Period kn Over GF(Pm). 38-41 - Teck-Kuen Chua, David C. Pheanis:
Bandwidth-Conserving Multicast VoIP Teleconference System. 42-48 - Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai:
An Update on the Analysis and Design of NMAC and HMAC Functions. 49-60 - Falko Dressler:
Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks. 61-68 - Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb El-Saddik, Amiya Nayak:
Detecting and Preventing IP-spoofed Distributed DoS Attacks. 69-80 - Mohamed G. Gouda, Alex X. Liu:
Formal Specification and Verification of a Secure Micropayment Protocol. 81-87 - Mehrdad Naderi, Jawed I. A. Siddiqi, Babak Akhgar, Wolfgang Orth, Norbert Meyer, Miika Tuisku, Gregor Pipan:
Towards a Framework for Federated Global Identity Management. 88-99 - Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo:
A New and Efficient Signature on Commitment Values. 100-105 - Maged Hamada Ibrahim:
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing. 106-113 - Biming Tian, Mingxing He:
A Self-healing Key Distribution Scheme with Novel Properties. 114-119 - Wen-Shenq Juang, Jing-Lin Wu:
Efficient User Authentication and Key Agreement with User Privacy Protection. 120-129 - Ye Zhu, Xinwen Fu, Riccardo Bettati:
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. 130-140 - Zhijie Jerry Shi, Hai Yun:
Software Implementations of Elliptic Curve Cryptography. 141-150
Volume 7, Number 2, September 2008
- Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Cryptanalysis of Syverson's Rational Exchange Protocol. 151-156 - Luis Hernández Encinas, Ángel Martín del Rey, Jaime Muñoz Masqué:
A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes. 157-159 - Said Gharout, Yacine Challal, Abdelmadjid Bouabdallah:
Scalable Delay-constrained Multicast Group Key Management. 160-174 - Zuo-Wen Tan:
Improvement on Nominative Proxy Signature Schemes. 175-180 - Shengbao Wang, Zhenfu Cao, Feng Cao:
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy. 181-186 - Depeng Li, Srinivas Sampalli:
Further Improvements of Fast Encryption Algoirthm for Multimedia. 187-192 - Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Customizing Cellular Message Encryption Algorithm. 193-201 - Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, Xiaohui Liang:
A Simple User Authentication Scheme for Grid Computing. 202-206 - Eyad Taqieddin, Sarangapani Jagannathan, Ann Miller:
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks. 207-217 - Zuhua Shao:
Repairing Efficient Threshold Group Signature Scheme. 218-222 - Debasis Giri, P. D. Srivastava:
A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security. 223-234 - Fangjun Huang:
A New General Transparency Model for Block-based Watermarking Method. 235-239 - Azad H. Azadmanesh, Alireza Farahani, Lotfi Najjar:
Fault Tolerant Weighted Voting Algorithms. 240-248 - Tarun Bhaskar, B. Narasimha Kamath, Soumyo D. Moitra:
A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability. 249-260 - Liang-Min Wang, Jian-Feng Ma, Yan-Bo Guo:
Node-failure Tolerance of Topology in Wireless Sensor Networks. 261-264 - Ze-mao Zhao:
ID-based Weak Blind Signature From Bilinear Pairings. 265-268 - Tongjiang Yan, Xiaoni Du, Shuqing Li, Guozhen Xiao:
Trace Representations and Multi-rate Constructions of Two Classes of Generalized Cyclotomic Sequences. 269-272 - Hai Tao, Carlisle Adams:
Pass-Go: A Proposal to Improve the Usability of Graphical Passwords. 273-292 - Baodian Wei, Fangguo Zhang, Xiaofeng Chen:
A New Type of Designated Confirmer Signatures for a Group of Individuals. 293-300
Volume 7, Number 3, November 2008
- Jau-Ji Shen, Po-Wei Hsu:
A Fragile Associative Watermarking on 2D Barcode for Data Authentication. 301-309 - Siu Fung Yeung, John C. S. Lui, David K. Y. Yau:
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching. 310-322 - Qiong Zhang, Yuke Wang, Jason P. Jue:
A Key Management Scheme for Hierarchical Access Control in Group Communication. 323-334 - Shuhua Wu, Yuefei Zhu:
Proof of Forward Security for Password-based Authenticated Key Exchange. 335-341 - Shengbao Wang, Zhenfu Cao, Haiyong Bao:
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing. 342-347 - Sherman S. M. Chow:
Multi-Designated Verifiers Signatures Revisited. 348-357 - Ashok Kumar Das:
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks. 358-369 - Alec Yasinsac, Jeffrey Todd McDonald:
Tamper Resistant Software Through Intent Protection. 370-382 - Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh:
Weak Composite Diffie-Hellman. 383-387 - Salekul Islam, Mohammad Abu Zaid:
Probabilistic Analysis and Verification of the ASW Protocol using PRISM. 388-396 - Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Multiplicative Forward-Secure Threshold Signature Scheme. 397-403 - Nikolay A. Moldovyan:
On Cipher Design Based on Switchable Controlled Operations. 404-415 - Dan Lu, Yoshitake Kobayashi, Ken Nakayama, Mamoru Maekawa:
Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality. 416-427 - Xin Tang, Constantine N. Manikopoulos, Sotirios G. Ziavras:
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior . 428-435 - N. Srinivasan, V. Vaidehi:
Performance Analysis of Soft Computing Based Anomaly Detectors. 436-447 - Ángel Martín del Rey, Gerardo Rodríguez Sánchez:
On the Security of ''Golden'' Cryptography. 448-450
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.