default search action
International Journal of Network Security, Volume 6
Volume 6, Number 1, January 2008
- Chunxiang Xu, Junhui Zhou, Guozhen Xiao:
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security. 1-5 - Francesco Palmieri:
Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace. 6-14 - Qingyu Zhang, Kenneth L. Calvert:
A Peer-based Recovery Scheme for Group Rekeying in Secure Multicast. 15-25 - Yijuan Shi, Jianhua Li, Jianjun Shi:
Constructing Efficient Certificateless Public Key Encryption with Pairing. 26-32 - Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:
A Study on the Security of Privacy Homomorphism. 33-39 - Hwa Young Um, Edward J. Delp:
A Secure Group Key Management Scheme for Wireless Cellular Systems. 40-52 - Marko Hassinen, Maija Marttila-Kontio, Mikko Saesmaa, Heli Tervo:
Secure Two-Way Transfer of Measurement Data. 53-59 - Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh:
Baseline Profile Stability for Network Anomaly Detection. 60-66 - Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor:
Group Key Management in MANETs. 67-79 - Michal Sramka:
Cryptanalysis of the Cryptosystem Based on DLP gamma = alphaabetab. 80-81 - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Short Designated Verifier Signature Scheme and Its Identity-based Variant. 82-93 - Nithin Nagaraj, Vivek Vaidya, Prabhakar G. Vaidya:
Re-visiting the One-Time Pad. 94-102 - Tarek S. Sobh, Ashraf Elgohary, Mohammed Zaki:
Performance Improvements on the Network Level Security Protocols. 103-115 - Da-Zhi Sun, Zhen-Fu Cao:
New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme. 116-120
Volume 6, Number 2, March 2008
- Xiangui Kang, Wenjun Zeng, Jiwu Huang:
A Multi-band Wavelet Watermarking Scheme. 121-126 - Thian Song Ong, Andrew Teoh Beng Jin, David Chek Ling Ngo:
Application-Specific Key Release Scheme from Biometrics. 127-133 - Ashok Kumar Das:
An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks. 134-144 - Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Ali Chehab:
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System. 145-157 - Christos Xenakis:
Security Measures and Weaknesses of the GPRS Security Architecture. 158-169 - Joseph K. Liu, Duncan S. Wong:
Solutions to Key Exposure Problem in Ring Signature. 170-180 - Atul Chaturvedi, Sunder Lal:
An Authenticated Key Agreement Protocol Using Conjugacy Problem in Braid Groups. 181-184 - Fang-Ping Chiang, Yi-Mien Lin, Ya-Fen Chang:
Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme. 185-189 - Zine-Eddine Abid, Wei Wang:
Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems. 190-200 - Yingwu Zhu, Yiming Hu:
SurePath: An Approach to Resilient Anonymous Routing. 201-210 - Mohammed Misbahuddin, Shoba Bindu Chigarepalli:
Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme. 211-213 - Xiaolan Joy Zhang, Brian King:
Security Requirements for RFID Computing Systems. 214-226 - Ali Aydin Selçuk, Ersin Uzun, Mark Resat Pariente:
A Reputation-based Trust Management System for P2P Networks. 227-237 - Martin Stanek:
Attacking LCCC Batch Verification of RSA Signatures. 238-240
Volume 6, Number 3, May 2008
- Min-Ho Kim, Çetin Kaya Koç:
Improving the Novikov and Kiselev User Authentication Scheme. 241-245 - Rui Jiang, Aiqun Hu, Jianhua Li:
Formal Protocol Design of ESIKE Based on Authentication Tests. 246-254 - Pei-Yih Ting, Xiao-Wei Huang:
Distributed Paillier Plaintext Equivalence Test. 258-264 - Tony Thomas, Arbind K. Lal:
A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting. 265-269 - Depeng Li, Srinivas Sampalli:
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying. 270-281 - Manik Lal Das:
Comments on "Improved Efficient Remote User Authentication Schemes". 282-284 - Wei-Bin Lee, Chang-Kuo Yeh:
A Self-Concealing Mechanism for Authentication of Portable Communication Systems. 285-290 - Jing Li, Po Zhang, Srinivas Sampalli:
Improved Security Mechanism for Mobile IPv6. 291-300 - Zaiqiang Liu, Dongdai Lin, Fengdeng Guo:
A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine. 301-308 - Chin-Tser Huang, Sachin Thareja, Yong-June Shin:
Wavelet-based Real Time Detection of Network Traffic Anomalies. 309-320 - Hao Luo, Binxing Fang, Xiao-chun Yun, Zhi-Gang Wu:
An Effective Anomaly Detection Method in SMTP Traffic. 321-330 - Men Long, Chwan-Hwa John Wu, J. David Irwin:
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation. 331-341 - N. Nalini, G. Raghavendra Rao:
Cryptanalysis of Block Ciphers via Improved Particle Swarm Optimisation and Extended Simulated Annealing Techniques. 342-353 - Ali Bagherzandi, Javad Mohajeri, Mahmoud Salmasizadeh:
Comparison Based Semantic Security is Probabilistic Polynomial Time Equivalent to Indistinguishability. 354-360
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.