


default search action
International Journal of Network Security, Volume 9
Volume 9, Number 1, July 2009
- Tony Thomas:

Secure Two-party Protocols for Point Inclusion Problem. 1-7 - Kitae Kim, Ikkwon Yie, Seongan Lim:

Remark on Shao et al.'s Bidirectional Proxy Re-signature Scheme in Indocrypt'07. 8-11 - Jia Lun Tsai:

Efficient Nonce-based Authentication Scheme for Session Initiation Protocol. 12-16 - Fuw-Yi Yang:

Improvement on a Trapdoor Hash Function. 17-21 - Mohamed Salah Bouassida, Gilles Guette, Mohamed Shawky, Bertrand Ducourthial:

Sybil Nodes Detection Based on Received Signal Strength Variations within VANET. 22-33 - Jyh-Jian Sheu:

An Efficient Two-phase Spam Filtering Method Based on E-mails Categorization. 34-43 - Jorge Nakahara Jr.:

On the Order of Round Components in the AES. 44-50 - Maged Hamada Ibrahim:

Resisting Traitors in Linkable Democratic Group Signatures. 51-60 - Hristo Koshutanski:

A Survey on Distributed Access Control Systems for Web Business Processes. 61-69 - Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje:

Concurrency Control for Multilevel Secure Databases. 70-81 - M. Razvi Doomun, K. M. S. Soyjaudah:

Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security. 82-94 - Tianjie Cao, Peng Shen:

Cryptanalysis of Two RFID Authentication Protocols . 95-100
Volume 9, Number 2, September 2009
- Yoshito Kanamori, Seong-Moo Yoo, Don A. Gregory, Frederick T. Sheldon:

Authentication Protocol Using Quantum Superposition States. 101-108 - Jorge Nakahara Jr., Élcio Abrahão:

A New Involutory MDS Matrix for the AES. 109-116 - Tzu-Chun Lin:

Algorithms on Elliptic Curves over Fields of Characteristic Two with Non-adjacent Forms. 117-120 - Tim Landstra, Sarangapani Jagannathan, Maciej J. Zawodniok:

Energy-efficient Hybrid Key Management Protocol for Wireless Sensor Networks. 121-134 - Sunghyuck Hong:

Queue-based Group Key Agreement Protocol. 135-142 - Vincenzo Falletta, Fabio Ricciato:

Detecting Scanners: Empirical Assessment on a 3G Network. 143-155 - Cong Jin, Jun Liu, Qinghua Deng:

Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance. 156-163 - Günther Lackner, Udo Payer, Peter Teufl:

Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods. 164-172 - Thomas Chardin, Raphaël Marinier:

An Adaptive Chosen-plaintext Attack of the Improved Cellular Message Encryption Algorithm. 173-179 - Nikolay A. Moldovyan:

Acceleration of the Elliptic Cryptography with Vector Finite Fields. 180-185 - Jinu Kurian, Kamil Saraç:

Defending Network-based Services Against Denial of Service Attacks. 186-200
Volume 9, Number 3, November 2009
- Cheng-Chi Lee:

On Security of An Efficient Nonce-based Authentication Scheme for SIP. 201-203 - Moon-Chuen Lee, Yijun He, Zhaole Chen:

Towards Improving an Algebraic Marking Scheme for Tracing DDoS Attacks. 204-213 - Girraj Kumar Verma:

A Proxy Blind Signature Scheme over Braid Groups. 214-217 - R. Rajaram Ramasamy, M. Amutha Prabakar, M. Indra Devi, M. Suguna:

Knapsack Based ECC Encryption and Decryption. 218-226 - Chang-Kuo Yeh, Wei-Bin Lee:

An Overall Cost-effective Authentication Technique for the Global Mobility Network. 227-232 - Quoc-Cuong Le, Patrick Bellot:

How Can Quasi-trusted Nodes Help to Securely Relay QKD Keys?. 233-241 - Haibo Tian, Xiaofeng Chen, Yong Ding:

Analysis of Two Types Deniable Authentication Protocols. 242-246 - Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang:

Security and Trust in Digital Rights Management: A Survey. 247-263 - Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak:

Algorithms and Approaches of Proxy Signature: A Survey. 264-284 - Jorge Nakahara Jr.:

Analysis of Venkaiah et al.'s AES Design. 285-289 - Mohammad Reza Ahmadi:

An Intrusion Prediction Technique Based on Co-evolutionary Immune System for Network Security (CoCo-IDP) . 290-300

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














