


default search action
International Journal of Network Security, Volume 6
Volume 6, Number 1, January 2008
- Chunxiang Xu, Junhui Zhou, Guozhen Xiao:

General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security. 1-5 - Francesco Palmieri:

Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace. 6-14 - Qingyu Zhang, Kenneth L. Calvert:

A Peer-based Recovery Scheme for Group Rekeying in Secure Multicast. 15-25 - Yijuan Shi, Jianhua Li, Jianjun Shi:

Constructing Efficient Certificateless Public Key Encryption with Pairing. 26-32 - Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:

A Study on the Security of Privacy Homomorphism. 33-39 - Hwa Young Um, Edward J. Delp:

A Secure Group Key Management Scheme for Wireless Cellular Systems. 40-52 - Marko Hassinen, Maija Marttila-Kontio, Mikko Saesmaa, Heli Tervo:

Secure Two-Way Transfer of Measurement Data. 53-59 - Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh:

Baseline Profile Stability for Network Anomaly Detection. 60-66 - Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor:

Group Key Management in MANETs. 67-79 - Michal Sramka:

Cryptanalysis of the Cryptosystem Based on DLP gamma = alphaabetab. 80-81 - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:

Short Designated Verifier Signature Scheme and Its Identity-based Variant. 82-93 - Nithin Nagaraj, Vivek Vaidya, Prabhakar G. Vaidya:

Re-visiting the One-Time Pad. 94-102 - Tarek S. Sobh, Ashraf Elgohary, Mohammed Zaki:

Performance Improvements on the Network Level Security Protocols. 103-115 - Da-Zhi Sun, Zhen-Fu Cao:

New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme. 116-120
Volume 6, Number 2, March 2008
- Xiangui Kang, Wenjun Zeng, Jiwu Huang:

A Multi-band Wavelet Watermarking Scheme. 121-126 - Thian Song Ong, Andrew Teoh Beng Jin, David Chek Ling Ngo:

Application-Specific Key Release Scheme from Biometrics. 127-133 - Ashok Kumar Das:

An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks. 134-144 - Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Ali Chehab:

LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System. 145-157 - Christos Xenakis:

Security Measures and Weaknesses of the GPRS Security Architecture. 158-169 - Joseph K. Liu, Duncan S. Wong:

Solutions to Key Exposure Problem in Ring Signature. 170-180 - Atul Chaturvedi, Sunder Lal:

An Authenticated Key Agreement Protocol Using Conjugacy Problem in Braid Groups. 181-184 - Fang-Ping Chiang, Yi-Mien Lin, Ya-Fen Chang:

Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme. 185-189 - Zine-Eddine Abid, Wei Wang:

Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems. 190-200 - Yingwu Zhu, Yiming Hu:

SurePath: An Approach to Resilient Anonymous Routing. 201-210 - Mohammed Misbahuddin, Shoba Bindu Chigarepalli:

Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme. 211-213 - Xiaolan Joy Zhang, Brian King:

Security Requirements for RFID Computing Systems. 214-226 - Ali Aydin Selçuk, Ersin Uzun, Mark Resat Pariente:

A Reputation-based Trust Management System for P2P Networks. 227-237 - Martin Stanek:

Attacking LCCC Batch Verification of RSA Signatures. 238-240
Volume 6, Number 3, May 2008
- Min-Ho Kim, Çetin Kaya Koç:

Improving the Novikov and Kiselev User Authentication Scheme. 241-245 - Rui Jiang, Aiqun Hu, Jianhua Li:

Formal Protocol Design of ESIKE Based on Authentication Tests. 246-254 - Pei-Yih Ting, Xiao-Wei Huang:

Distributed Paillier Plaintext Equivalence Test. 258-264 - Tony Thomas, Arbind K. Lal:

A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting. 265-269 - Depeng Li, Srinivas Sampalli:

A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying. 270-281 - Manik Lal Das:

Comments on "Improved Efficient Remote User Authentication Schemes". 282-284 - Wei-Bin Lee, Chang-Kuo Yeh:

A Self-Concealing Mechanism for Authentication of Portable Communication Systems. 285-290 - Jing Li, Po Zhang, Srinivas Sampalli:

Improved Security Mechanism for Mobile IPv6. 291-300 - Zaiqiang Liu, Dongdai Lin, Fengdeng Guo:

A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine. 301-308 - Chin-Tser Huang, Sachin Thareja, Yong-June Shin:

Wavelet-based Real Time Detection of Network Traffic Anomalies. 309-320 - Hao Luo, Binxing Fang, Xiao-chun Yun, Zhi-Gang Wu:

An Effective Anomaly Detection Method in SMTP Traffic. 321-330 - Men Long, Chwan-Hwa John Wu, J. David Irwin:

Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation. 331-341 - N. Nalini, G. Raghavendra Rao:

Cryptanalysis of Block Ciphers via Improved Particle Swarm Optimisation and Extended Simulated Annealing Techniques. 342-353 - Ali Bagherzandi, Javad Mohajeri, Mahmoud Salmasizadeh:

Comparison Based Semantic Security is Probabilistic Polynomial Time Equivalent to Indistinguishability. 354-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














