default search action
International Journal of Network Security, Volume 10
Volume 10, Number 1, January 2010
- I-Shi Lee, Wen-Hsiang Tsai:
Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code. 1-10 - Liam Wagner, Stuart McDonald:
Finding Traitors in Secure Networks Using Byzantine Agreements. 11-17 - Adrian Mizzi:
Return on Information Security Investment - The Viability Of An Anti-Spam Solution In A Wireless Environment. 18-24 - Chunxiang Gu, Yuefei Zhu:
New Efficient Searchable Encryption Schemes from Bilinear Pairings. 25-31 - Narendra K. Pareek, Vinod Patidar, Krishan K. Sud:
A Random Bit Generator Using Chaotic Maps. 32-38 - Malliga Subramanian, Tamilarasi Angamuthu:
An Autonomous Framework for Early Detection of Spoofed Flooding Attacks. 39-50 - Mohsen Toorani, Ali Asghar Beheshti Shirazi:
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme. 51-56 - Jianqin Zhou:
A Note on the Constructions of Orthomorphic Permutations. 57-61 - Ahmad Almulhem, Issa Traoré:
Detecting Connection-Chains: A Data Mining Approach. 62-74 - Hu Xiong, Zhiguang Qin, Fagen Li:
Identity-based Threshold Signature Secure in the Standard Model. 75-80
Volume 10, Number 2, March 2010
- Xiaozhuo Gu, Jianzu Yang:
Design Universal Security Scheme for Broadband Router. 81-86 - S. Selvakani Kandeeban, Rengan S. Rajesh:
Integrated Intrusion Detection System Using Soft Computing. 87-92 - Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris:
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks. 93-106 - Rajaram Ramasamy, Amutha Prabakar Muniyandi:
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation. 107-113 - Qiang Tang, Dongyao Ji:
Verifiable Attribute Based Encryption. 114-120 - Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, Samuel S. Wagstaff Jr.:
Provable Partial Key Escrow. 121-124 - Hongwei Li, Atam P. Dhawan:
MOSAR: A Secured On-demand Routing Protocol for Mobile Multilevel Ad Hoc Networks. 125-138 - Ramanarayana Kandikattu, Lillykutty Jacob:
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network. 139-152 - Tongjiang Yan:
New Binary Sequences of Period pq with Low Values of Correlation and Large Linear Complexity. 153-157 - Zhiwei Wang, Licheng Wang, Yixian Yang, Zhengming Hu:
Comment on Wu et al.'s Server-aided Verification Signature Schemes. 158-160
Volume 10, Number 3, May 2010
- Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, Balasubramaniam Srinivasan:
Dynamic Key Cryptography and Applications. 161-174 - Manoj Kumar:
An Enhanced Remote User Authentication Scheme with Smart Card. 175-184 - Moon K. Chetry, W. B. Vasantha Kandaswamy:
A Note On Self-Shrinking Lagged Fibonacci Generator. 185-187 - Yong Zeng, Jianfeng Ma, Sang-Jae Moon:
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing. 188-193 - Benamar Kadri, Mohammed Feham, Abdallah M'hamed:
Lightweight PKI for WSN uPKI. 194-200 - Loránd Szöllösi, Tamás Marosits, Gábor Fehér:
Accelerating RSA Encryption Using Random Precalculations. 201-204 - Rajavelu Srinivasan, Vaidehi V., Rajavelu Rajaraman, S. Kanagaraj, R. Chidambaram Kalimuthu, R. Dharmaraj:
Secure Group Key Management Scheme for Multicast Networks. 205-209 - V. Umakanta Sastry, N. Ravi Shankar, S. Durga Bhavani:
A Modified Hill Cipher Involving Interweaving and Iteration. 210-215 - Diaa Salama Abd Elminaam, Hatem Mohamed Abdual-Kader, Mohiy Mohamed Hadhoud:
Evaluating The Performance of Symmetric Encryption Algorithms. 216-222
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.