


default search action
International Journal of Network Security, Volume 10
Volume 10, Number 1, January 2010
- I-Shi Lee, Wen-Hsiang Tsai:

Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code. 1-10 - Liam Wagner, Stuart McDonald:

Finding Traitors in Secure Networks Using Byzantine Agreements. 11-17 - Adrian Mizzi:

Return on Information Security Investment - The Viability Of An Anti-Spam Solution In A Wireless Environment. 18-24 - Chunxiang Gu, Yuefei Zhu:

New Efficient Searchable Encryption Schemes from Bilinear Pairings. 25-31 - Narendra K. Pareek, Vinod Patidar, Krishan K. Sud:

A Random Bit Generator Using Chaotic Maps. 32-38 - Malliga Subramanian, Tamilarasi Angamuthu:

An Autonomous Framework for Early Detection of Spoofed Flooding Attacks. 39-50 - Mohsen Toorani, Ali Asghar Beheshti Shirazi:

Cryptanalysis of an Elliptic Curve-based Signcryption Scheme. 51-56 - Jianqin Zhou:

A Note on the Constructions of Orthomorphic Permutations. 57-61 - Ahmad Almulhem, Issa Traoré:

Detecting Connection-Chains: A Data Mining Approach. 62-74 - Hu Xiong, Zhiguang Qin, Fagen Li:

Identity-based Threshold Signature Secure in the Standard Model. 75-80
Volume 10, Number 2, March 2010
- Xiaozhuo Gu, Jianzu Yang:

Design Universal Security Scheme for Broadband Router. 81-86 - S. Selvakani Kandeeban, Rengan S. Rajesh:

Integrated Intrusion Detection System Using Soft Computing. 87-92 - Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris:

Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks. 93-106 - Rajaram Ramasamy, Amutha Prabakar Muniyandi:

Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation. 107-113 - Qiang Tang, Dongyao Ji:

Verifiable Attribute Based Encryption. 114-120 - Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, Samuel S. Wagstaff Jr.:

Provable Partial Key Escrow. 121-124 - Hongwei Li, Atam P. Dhawan:

MOSAR: A Secured On-demand Routing Protocol for Mobile Multilevel Ad Hoc Networks. 125-138 - Ramanarayana Kandikattu, Lillykutty Jacob:

Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network. 139-152 - Tongjiang Yan:

New Binary Sequences of Period pq with Low Values of Correlation and Large Linear Complexity. 153-157 - Zhiwei Wang, Licheng Wang, Yixian Yang, Zhengming Hu:

Comment on Wu et al.'s Server-aided Verification Signature Schemes. 158-160
Volume 10, Number 3, May 2010
- Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, Balasubramaniam Srinivasan:

Dynamic Key Cryptography and Applications. 161-174 - Manoj Kumar:

An Enhanced Remote User Authentication Scheme with Smart Card. 175-184 - Moon K. Chetry, W. B. Vasantha Kandaswamy:

A Note On Self-Shrinking Lagged Fibonacci Generator. 185-187 - Yong Zeng, Jianfeng Ma, Sang-Jae Moon:

An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing. 188-193 - Benamar Kadri, Mohammed Feham, Abdallah M'hamed:

Lightweight PKI for WSN uPKI. 194-200 - Loránd Szöllösi, Tamás Marosits, Gábor Fehér:

Accelerating RSA Encryption Using Random Precalculations. 201-204 - Rajavelu Srinivasan, Vaidehi V., Rajavelu Rajaraman, S. Kanagaraj, R. Chidambaram Kalimuthu, R. Dharmaraj:

Secure Group Key Management Scheme for Multicast Networks. 205-209 - V. Umakanta Sastry, N. Ravi Shankar, S. Durga Bhavani:

A Modified Hill Cipher Involving Interweaving and Iteration. 210-215 - Diaa Salama Abd Elminaam, Hatem Mohamed Abdual-Kader, Mohiy Mohamed Hadhoud:

Evaluating The Performance of Symmetric Encryption Algorithms. 216-222

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














