


default search action
International Journal of Network Security, Volume 3
Volume 3, Number 1, July 2006
- Yan Zhang, Masayuki Fujise:

Security Management in the Next Generation Wireless Networks. 1-7 - Liming Wang, Chuan-Kun Wu:

Efficient Key Agreement for Large and Dynamic Multicast Groups. 8-17 - Qi Xie, Xiuyuan Yu:

Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes. 18-22 - Ratna Dutta, Rana Barua:

Password-based Encrypted Group Key Agreement. 23-34 - Rongxing Lu, Zhenfu Cao:

Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication. 35-38 - Jung-Wen Lo:

The Improvement of YSYCT Scheme for Imbalanced Wireless Network. 39-43 - Dimitrios L. Delivasilis, Sokratis K. Katsikas:

Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices. 44-50 - Eun-Jun Yoon, Kee-Young Yoo:

A Forgery Attack on A Low Computation Cost User Authentication Scheme. 51-53 - Kenneth L. Calvert, Srinivasan Venkatraman, Jim Griffioen:

Authenticated Access to Reserved Network Resources. 54-64 - Martin Stanek:

Enforcing Policies in Content Manipulation Signature Schemes. 65-72 - Vishal Bhargava, Mihail L. Sichitiu:

Physical Security Perimeters for Wireless Local Area Networks. 73-84 - Kim-Kwang Raymond Choo:

On the Security of Lee, Kim, Kim, & Oh Key Agreement Protocol. 85-94 - Sunil Kumar Kashyap, Birendra Kumar Sharma, Amitabh Banerjee:

A Cryptosystem Based on DLP gamma = alphaabetab mod p. 95-100
Volume 3, Number 2, September 2006
- Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang:

Password Authentication Schemes: Current Status and Key Issues. 101-115 - Bin Wang, Zheng-Quan Li:

A Forward-Secure User Authentication Scheme with Smart Cards. 116-119 - Wassim Itani, Ayman I. Kayssi, Ali Chehab, Camille Gaspard:

A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices. 120-131 - Sangook Moon:

A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems. 132-137 - Tianjie Cao, Dongdai Lin, Rui Xue:

Security Analysis of Some Batch Verifying Signatures from Pairings. 138-143 - Sahadeo Padhye, Birendra Kumar Sharma:

A Fast Semantically Secure Public Key Cryptosystem Based on Factoring. 144-150 - Eun-Jun Yoon, Kee-Young Yoo:

On the Security of Signature Scheme with Message Recovery and Its Application. 151-154 - Fagen Li, Xiangjun Xin, Yupu Hu:

ID-based Signcryption Scheme with (t, n) Shared Unsigncryption. 155-159 - Hamdy S. Soliman, Mohammed Omari:

Application of Synchronous Dynamic Encryption System (SDES) in Wireless Sensor Networks. 160-171 - Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hartnett:

Personality Trait Based Simulation Model of the E-mail System. 172-190 - Asad Amir Pirzada, Chris McDonald:

Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks. 191-202
Volume 3, Number 3, November 2006
- Munirul M. Haque, Sheikh Iqbal Ahamed:

Security in Pervasive Computing: Current Status and Open Issues. 203-214 - Wenling Wu, Wentao Zhang, Dongdai Lin:

Security on Generalized Feistel Scheme with SP Round Function. 215-224 - Rama Murthy Garimella:

Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach. 225-229 - Shijun Xiang, Jiwu Huang:

Analysis of Quantization-based Audio Watermarking to D/A and A/D Conversions. 230-238 - Mustapha Hedabou:

A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz. 239-243 - Bin Zhu, Ali A. Ghorbani:

Alert Correlation for Extracting Attack Strategies. 244-258 - Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu:

Authentication and Key Agreement Protocols Preserving Anonymity. 259-270 - Khin Mi Mi Aung, Kiejin Park, Jong Sou Park:

Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration. 271-278 - Alberto Peinado Domínguez:

Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems. 279-282 - Ren-Chiun Wang, Chou Chen Yang:

Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards. 283-285 - Zuhua Shao:

Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme. 286-289 - Zhaohui Cheng, Richard Comley:

Attacks on An ISO/IEC 11770-2 Key Establishment Protocol. 290-295 - Samuel S. Wagstaff Jr.:

Is There a Shortage of Primes for Cryptography? 296-299

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














