


Остановите войну!
for scientists:


default search action
International Journal of Network Security, Volume 4
Volume 4, Number 1, January 2007
- Nan-I Wu, Min-Shiang Hwang:
Data Hiding: Current Status and Key Issues. 1-9 - Cungang Yang:
Designing of ORBAC Model For Secure Domain Environments. 10-16 - Shangping Zhong, Xueqi Cheng, Tierui Chen:
Data Hiding in a Kind of PDF Texts for Secret Communication. 17-26 - Alessandra Lumini, Loris Nanni:
When Fingerprints Are Combined with Iris - A Case Study: FVC2004 and CASIA. 27-34 - Ping Ding:
Central Manager: A Solution to Avoid Denial Of Service Attacks for Wireless LANs. 35-44 - Li Zhuang, J. D. Tygar, Rachna Dhamija:
Injecting Heterogeneity Through Protocol Randomization. 45-58 - Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Mamoru Maekawa:
Java Bytecode Dependence Analysis for Secure Information Flow. 59-68 - Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Kostas G. Anagnostakis, Jonathan M. Smith:
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications. 69-80 - Nikolay A. Moldovyan, Peter A. Moldovyanu, Douglas H. Summerville:
On Software Implementation of Fast DDP-based Ciphers. 81-89 - Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa:
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks. 90-98 - Jaewon Lee, Heeyoul Kim, Younho Lee, Seong-Min Hong, Hyunsoo Yoon:
Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field. 99-106 - Despoina Palaka, Petros Daras, Kosmas Petridis, Michael G. Strintzis:
A Novel Peer-to-peer Payment Protocol. 107-120
Volume 4, Number 2, March 2007
- Pin Lin, Wenling Wu, Chuankun Wu:
Security Analysis of Double Length Compression Function Based on Block Cipher. 121-127 - Brian J. Cacic, Ruizhong Wei:
Improving Indirect Key Management Scheme of Access Hierarchies. 128-137 - Pairat Thorncharoensri, Tianbing Xia, Yi Mu:
How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis. 138-148 - Xiaojian Tian, Robert W. Zhu, Duncan S. Wong:
Improved Efficient Remote User Authentication Schemes. 149-154 - Leon Pan:
A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7. 155-165 - Mahalingam Ramkumar:
Broadcast Authentication With Preferred Verifiers. 166-178 - Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin:
Distributed Cryptographic Computing on Grid. 179-186 - Amit K. Awasthi, Sunder Lal:
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. 187-192 - Jiguo Li, Shuhong Wang:
New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key. 193-200 - Aneta Zwierko, Zbigniew Kotulski:
Integrity of mobile agents: a new approach. 201-211 - Magdy Saeb, Meer Hamza, Ahmed El-Shikh:
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems. 212-226 - Wei Ren:
Pulsing RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks. 227-234 - Minho Kim, Çetin Kaya Koç:
Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme. 235-239
Volume 4, Number 3, May 2007
- Lin-Huang Chang, Che Lin Lo, Jui Jen Lo, Wei-Ting Liu, Chou Chen Yang:
Mobility Management with Distributed AAA Architecture. 241-247 - Rongxing Lu, Zhenfu Cao, Jun Shao:
On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification. 248-253 - Kannan Karthik, Dimitrios Hatzinakos:
Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit Plane for Multicast Content Protection. 254-265 - Xiangxue Li, Dong Zheng, Kefei Chen:
LFSR-based Signatures with Message Recovery. 266-270 - Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed:
ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications. 271-281 - Dayin Wang, Dongdai Lin, Wenling Wu:
Related-Mode Attacks on CTR Encryption Mode. 282-287 - Willy Susilo, Hiroaki Kikuchi:
Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner. 288-291 - Zonghua Zhang, Hong Shen, Yingpeng Sang:
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection. 292-305 - Zhensong Liao, Hai Jin, Deqing Zou, Weizhong Qiang:
A Novel Approach to Hide Credentials. 306-311 - Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak:
Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings. 312-317 - Justin Zhijun Zhan, Stan Matwin:
Privacy-Preserving Data Mining in Electronic Surveys. 318-327 - Ajith Abraham, Crina Grosan, Carlos Martín-Vide:
Evolutionary Design of Intrusion Detection Programs. 328-339 - Paolo Dal Checco, Francesco Bergadano, Davide Cavagnino, Pasquale Andrea Nesta, Michele Miraglia, Pier Luigi Zaccone:
Secure Logging for Irrefutable Administration. 340-347 - Debasis Giri, Parmeshwary Dayal Srivastava:
An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies. 348-354 - Tianjie Cao, Xianping Mao:
Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes. 355-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.