


default search action
International Journal of Network Security, Volume 7
Volume 7, Number 1, July 2008
- Debabrata Nayak, Deepak B. Phatak, Ashutosh Saxena:

Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach. 1-14 - Kim-Kwang Raymond Choo:

Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols. 15-23 - Kazimierz Kowalski, Mohsen Beheshti:

Improving Security Through Analysis of Log Files Intersections. 24-30 - Guido Marco Bertoni, Luca Breveglieri, Pasqualina Fragneto, Gerardo Pelosi:

Parallel Hardware Architectures for the Cryptographic Tate Pairing. 31-37 - Jianqin Zhou:

Fast Algorithms for Determining the Minimal Polynomials of Sequences with Period kn Over GF(Pm). 38-41 - Teck-Kuen Chua, David C. Pheanis:

Bandwidth-Conserving Multicast VoIP Teleconference System. 42-48 - Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai:

An Update on the Analysis and Design of NMAC and HMAC Functions. 49-60 - Falko Dressler:

Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks. 61-68 - Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb El-Saddik, Amiya Nayak:

Detecting and Preventing IP-spoofed Distributed DoS Attacks. 69-80 - Mohamed G. Gouda, Alex X. Liu:

Formal Specification and Verification of a Secure Micropayment Protocol. 81-87 - Mehrdad Naderi, Jawed I. A. Siddiqi, Babak Akhgar, Wolfgang Orth, Norbert Meyer, Miika Tuisku, Gregor Pipan:

Towards a Framework for Federated Global Identity Management. 88-99 - Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo:

A New and Efficient Signature on Commitment Values. 100-105 - Maged Hamada Ibrahim:

Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing. 106-113 - Biming Tian, Mingxing He:

A Self-healing Key Distribution Scheme with Novel Properties. 114-119 - Wen-Shenq Juang, Jing-Lin Wu:

Efficient User Authentication and Key Agreement with User Privacy Protection. 120-129 - Ye Zhu, Xinwen Fu, Riccardo Bettati:

On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks. 130-140 - Zhijie Jerry Shi, Hai Yun:

Software Implementations of Elliptic Curve Cryptography. 141-150
Volume 7, Number 2, September 2008
- Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:

Cryptanalysis of Syverson's Rational Exchange Protocol. 151-156 - Luis Hernández Encinas, Ángel Martín del Rey, Jaime Muñoz Masqué:

A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes. 157-159 - Said Gharout, Yacine Challal, Abdelmadjid Bouabdallah:

Scalable Delay-constrained Multicast Group Key Management. 160-174 - Zuo-Wen Tan:

Improvement on Nominative Proxy Signature Schemes. 175-180 - Shengbao Wang, Zhenfu Cao, Feng Cao:

Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy. 181-186 - Depeng Li, Srinivas Sampalli:

Further Improvements of Fast Encryption Algoirthm for Multimedia. 187-192 - Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:

Customizing Cellular Message Encryption Algorithm. 193-201 - Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, Xiaohui Liang:

A Simple User Authentication Scheme for Grid Computing. 202-206 - Eyad Taqieddin, Sarangapani Jagannathan, Ann Miller:

Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks. 207-217 - Zuhua Shao:

Repairing Efficient Threshold Group Signature Scheme. 218-222 - Debasis Giri, P. D. Srivastava:

A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security. 223-234 - Fangjun Huang:

A New General Transparency Model for Block-based Watermarking Method. 235-239 - Azad H. Azadmanesh, Alireza Farahani, Lotfi Najjar:

Fault Tolerant Weighted Voting Algorithms. 240-248 - Tarun Bhaskar, B. Narasimha Kamath, Soumyo D. Moitra:

A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability. 249-260 - Liang-Min Wang, Jian-Feng Ma, Yan-Bo Guo:

Node-failure Tolerance of Topology in Wireless Sensor Networks. 261-264 - Ze-mao Zhao:

ID-based Weak Blind Signature From Bilinear Pairings. 265-268 - Tongjiang Yan, Xiaoni Du, Shuqing Li, Guozhen Xiao:

Trace Representations and Multi-rate Constructions of Two Classes of Generalized Cyclotomic Sequences. 269-272 - Hai Tao, Carlisle Adams:

Pass-Go: A Proposal to Improve the Usability of Graphical Passwords. 273-292 - Baodian Wei, Fangguo Zhang, Xiaofeng Chen:

A New Type of Designated Confirmer Signatures for a Group of Individuals. 293-300
Volume 7, Number 3, November 2008
- Jau-Ji Shen, Po-Wei Hsu:

A Fragile Associative Watermarking on 2D Barcode for Data Authentication. 301-309 - Siu Fung Yeung, John C. S. Lui, David K. Y. Yau:

Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching. 310-322 - Qiong Zhang, Yuke Wang, Jason P. Jue:

A Key Management Scheme for Hierarchical Access Control in Group Communication. 323-334 - Shuhua Wu, Yuefei Zhu:

Proof of Forward Security for Password-based Authenticated Key Exchange. 335-341 - Shengbao Wang, Zhenfu Cao, Haiyong Bao:

Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing. 342-347 - Sherman S. M. Chow:

Multi-Designated Verifiers Signatures Revisited. 348-357 - Ashok Kumar Das:

ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks. 358-369 - Alec Yasinsac, Jeffrey Todd McDonald:

Tamper Resistant Software Through Intent Protection. 370-382 - Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh:

Weak Composite Diffie-Hellman. 383-387 - Salekul Islam, Mohammad Abu Zaid:

Probabilistic Analysis and Verification of the ASW Protocol using PRISM. 388-396 - Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui, Siu-Ming Yiu:

Multiplicative Forward-Secure Threshold Signature Scheme. 397-403 - Nikolay A. Moldovyan:

On Cipher Design Based on Switchable Controlled Operations. 404-415 - Dan Lu, Yoshitake Kobayashi, Ken Nakayama, Mamoru Maekawa:

Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality. 416-427 - Xin Tang, Constantine N. Manikopoulos, Sotirios G. Ziavras:

Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior . 428-435 - N. Srinivasan, V. Vaidehi:

Performance Analysis of Soft Computing Based Anomaly Detectors. 436-447 - Ángel Martín del Rey, Gerardo Rodríguez Sánchez:

On the Security of ''Golden'' Cryptography. 448-450

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














