default search action
International Journal of Network Security, Volume 8
Volume 8, Number 1, January 2009
- Maged Hamada Ibrahim:
A Method for Obtaining Deniable Public-Key Encryption. 1-9 - Yuling Liu, Xingming Sun, Ingemar J. Cox, Hong Wang:
Natural Language Information Hiding Based on Chinese Mathematical Expression. 10-15 - Yusuf Kurniawan, Adang Suwandi A., M. Sukrisno Mardiyanto, Iping Supriana, Sarwono Sutikno:
The New Block Cipher: BC2. 16-24 - Gobindar S. Sandhu, Stevan M. Berber:
Theoretical Model, Simulation Results and Performances of a Secure Chaos-based Multi-user Communication System. 25-30 - Andrew Blyth:
An Architecture for An XML Enabled Firewall. 31-36 - Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin:
Anonymity in Wireless Broadcast Networks. 37-51 - Xiaofeng Chen, Guomin Chen, Fangguo Zhang, Baodian Wei, Yi Mu:
Identity-based Universal Designated Verifier Signature Proof System. 52-58 - B. Sathish Babu, Pallapa Venkataram:
A Dynamic Authentication Scheme for Mobile Transactions. 59-74 - Mohamed M. Nasreldin Rasslan, Yasser H. Dakroury, Heba Kamal Aslan:
A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach. 75-89 - Nikolay A. Moldovyan:
Short Signatures from Difficulty of Factorization Problem. 90-95 - Changji Wang, Dongyang Long, Yong Tang:
An Efficient Certificateless Signature from Pairings. 96-100
Volume 8, Number 2, March 2009
- Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Ordered Semiring-based Trust Establish Model with Risk Evaluating. 101-106 - Biju Issac:
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks. 107-118 - Fouz Sattar, Muid Mufti:
On Post Decryption Error Pobability in Counter Mode Operation with Explicit Counter Transmittal. 119-124 - Yang Ming, Yumin Wang:
An Efficient Verifiably Encrypted Signature Scheme without Random Oracles. 125-130 - Faisal Nabi:
Virtual Invisible Disk Design for Information System Security. 131-138 - Maged Hamada Ibrahim:
Efficient Dealer-Less Threshold Sharing of Standard RSA. 139-150 - Zhenfu Cao:
Universal Encrypted Deniable Authentication Protocol. 151-158 - Maged Hamada Ibrahim:
Receiver-deniable Public-Key Encryption. 159-165 - Chun-Ta Li, Yen-Ping Chu:
Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks. 166-168 - Brian King:
Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF(2^n). 169-176 - Hasan Mohammed Hasan Husein, Bayoumi I. Bayoumi, Fathy Saad Holail, Bahaa Eldin M. Hasan, Mohammed Z. Abd El-Mageed:
A Genetic Algorithm for Cryptanalysis with Application to DES-like Systems. 177-186 - Amjad Gawanmeh, Adel Bouhoula, Sofiène Tahar:
Rank Functions Based Inference System for Group Key Management Protocols Verification. 187-198 - Jie Liu, Jianhua Li:
Remarks on Zhang-Kim's Key Authentication Scheme. 199-200
Volume 8, Number 3, May 2009
- Jianping Zeng, Donghui Guo:
Agent-based Intrusion Detection For Network-based Application. 201-210 - Danilo Gligoroski:
On a Family of Minimal Candidate One-way Functions and One-way Permutations. 211-220 - Ali Bagherzandi, Mahmoud Salmasizadeh, Javad Mohajeri:
A Related Key Attack on the Feistel Type Block Ciphers. 221-226 - Yu Long, Zheng Gong, Kefei Chen, Shengli Liu:
Provably Secure Identity-based Threshold Key Escrow from Pairing. 227-234 - Hu Xiong, Zhiguang Qin, Fagen Li:
An Anonymous Sealed-bid Electronic Auction Based on Ring Signature. 235-242 - Somanath Tripathy, Sukumar Nandi:
LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption. 243-252 - Zein Radwan, Camille Gaspard, Ayman I. Kayssi, Ali Chehab:
Policy-driven and Content-based Web Services Security Gateway. 253-265 - Chunbo Ma, Jun Ao:
Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack. 266-270 - Chao Gong, Kamil Saraç:
Toward a Practical Packet Marking Approach for IP Traceback. 271-281 - Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee:
Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks. 282-292 - Danilo Gligoroski, Smile Markovski, Ljupco Kocarev:
Edon-R, An Infinite Family of Cryptographic Hash Functions. 293-300
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.