


default search action
International Journal of Network Security, Volume 12
Volume 12, Number 1, January 2011
- Chunbo Ma, Jun Ao:
Certificateless Group Oriented Signature Secure Against Key Replacement Attack. 1-6 - R. Rajaram Ramasamy, M. Amutha Prabakar:
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC. 7-12 - Riham Abdellatif, Heba Kamal Aslan, Salwa H. El-Ramly:
New Real Time Multicast Authentication Protocol. 13-20 - Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
Fault Attack, Countermeasures on Pairing Based Cryptography. 21-28 - Faisal Nabi:
Designing a Secure Framework Method for Secure Business Application Logic Integrity in e-Commerce Systems. 29-41 - Peyman Kabiri, Mehran Aghaei:
Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks. 42-49 - Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi:
Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor. 50-57 - Chi-Yu Liu, Cheng-Chi Lee, Tzu-Chun Lin:
Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme. 58-60
Volume 12, Number 2, March 2011
- Imane Aly Saroit, Said Fathy El-Zoghdy, Mostafa Matar:
A Scalable and Distributed Security Protocol for Multicast Communications. 61-74 - Mohammed Mana, Mohammed Feham, Boucif Amar Bensaber:
Trust Key Management Scheme for Wireless Body Area Networks. 75-83 - Chinniah Porkodi, Ramalingam Arumuganathan, Krishnasamy Vidya:
Multi-authority Electronic Voting Scheme Based on Elliptic Curves. 84-91 - Hu Xiong, Zhiguang Qin, Fagen Li:
A Certificateless Proxy Ring Signature Scheme with Provable Security. 92-106 - Garth V. Crosby, Lance Hester, Niki Pissinou:
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks. 107-117 - Girraj Kumar Verma:
Probable Security Proof of A Blind Signature Scheme over Braid Groups. 118-120
Volume 12, Number 3, May 2011
- Hussein Al-Bahadili, Shakir M. Hussain, Ghassan Issa, Khaled El-Zayyat:
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs. 121-129 - Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, Tsuyoshi Takagi:
Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings. 130-136 - S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari Bhat:
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points. 137-150 - Ekambaram Kesavulu Reddy:
Elliptic Curve Cryptosystems and Side-channel Attacks. 151-158 - Eman El-Emam, Magdy Koutb, Hamdy M. Kelash, Osama S. Faragallah:
An Authentication Protocol Based on Kerberos 5. 159-170 - Fuw-Yi Yang, Cai-Ming Liao:
An Anonymous Auction Protocol Based on GDH Assumption. 171-177 - Shiang-Feng Tzeng, Cheng-Chi Lee, Tzu-Chun Lin:
A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy. 178-180

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.