Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Network Security

ISSN: 1816--353X
Publisher: Femto Technique


ADD TO MY LIST
 
An Overall Cost-effective Authentication Technique for the Global Mobility Network PDF available

Author(s): Chang-Kuo Yeh | Wei-Bin Lee
Volume: 9
Issue: 3
Year: 2009
Algorithms and Approaches of Proxy Signature: A Survey PDF available

Author(s): Manik Lal Das | Ashutosh Saxena | Deepak B Phatak
Volume: 9
Issue: 3
Year: 2009
How Can Quasi-trusted Nodes Help to Securely Relay QKD Keys? PDF available

Author(s): Quoc-Cuong Le | Patrick Bellot
Volume: 9
Issue: 3
Year: 2009
Knapsack Based ECC Encryption and Decryption PDF available

Author(s): R. Rajaram Ramasamy | M. Amutha Prabakar | M. Indra Devi | M. Suguna
Volume: 9
Issue: 3
Year: 2009
Security and Trust in Digital Rights Management: A Survey PDF available

Author(s): Zhiyong Zhang | Qingqi Pei | Jianfeng Ma | Lin Yang
Volume: 9
Issue: 3
Year: 2009
A Proxy Blind Signature Scheme over Braid Groups PDF available

Author(s): Girraj Kumar Verma
Volume: 9
Issue: 3
Year: 2009
On Security of An Efficient Nonce-based Authentication Scheme for SIP PDF available

Author(s): Cheng-Chi Lee
Volume: 9
Issue: 3
Year: 2009
Analysis of Two Types Deniable Authentication Protocols PDF available

Author(s): Haibo Tian | Xiaofeng Chen | Yong Ding
Volume: 9
Issue: 3
Year: 2009
Analysis of Venkaiah et al.'s AES Design PDF available

Author(s): Jorge Nakahara
Volume: 9
Issue: 3
Year: 2009
Towards Improving an Algebraic Marking Scheme for Tracing DDoS Attacks PDF available

Author(s): Moon-Chuen Lee | Yi-Jun He | Zhaole Chen
Volume: 9
Issue: 3
Year: 2009
Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods PDF available

Author(s): Güenther Lackner | Udo Payer | Peter Teufl
Volume: 9
Issue: 2
Year: 2009
Queue-based Group Key Agreement Protocol PDF available

Author(s): Sunghyuck Hong
Volume: 9
Issue: 2
Year: 2009
A New Involutory MDS Matrix for the AES PDF available

Author(s): Jorge Nakahara Jr | Élcio Abrahão
Volume: 9
Issue: 2
Year: 2009
Defending Network-based Services Against Denial of Service Attacks PDF available

Author(s): Jinu Kurian | Kamil Sarac
Volume: 9
Issue: 2
Year: 2009
An Adaptive Chosen-plaintext Attack of the Improved Cellular Message Encryption Algorithm PDF available

Author(s): Thomas Chardin | Raphaël Marinier
Volume: 9
Issue: 2
Year: 2009
Acceleration of the Elliptic Cryptography with Vector Finite Fields PDF available

Author(s): Nikolay A. Moldovyan
Volume: 9
Issue: 2
Year: 2009
Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance PDF available

Author(s): Cong Jin | Jun Liu | Qinghua Deng
Volume: 9
Issue: 2
Year: 2009
Detecting Scanners: Empirical Assessment on a 3G Network PDF available

Author(s): Vincenzo Falletta | Fabio Ricciato
Volume: 9
Issue: 2
Year: 2009
Authentication Protocol Using Quantum Superposition States PDF available

Author(s): Yoshito Kanamori | Seong-Moo Yoo | Don A. Gregory | Frederick T. Sheldon
Volume: 9
Issue: 2
Year: 2009
Energy-efficient Hybrid Key Management Protocol for Wireless Sensor Networks PDF available

Author(s): Tim Landstra | Sarangapani Jagannathan | Maciej Zawodniok
Volume: 9
Issue: 2
Year: 2009
Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security PDF available

Author(s): M. Razvi Doomun | KMS Soyjaudah
Volume: 9
Issue: 1
Year: 2009
An Efficient Two-phase Spam Filtering Method Based on E-mails Categorization PDF available

Author(s): Jyh-Jian Sheu
Volume: 9
Issue: 1
Year: 2009
Resisting Traitors in Linkable Democratic Group Signatures PDF available

Author(s): Maged Hamada Ibrahim
Volume: 9
Issue: 1
Year: 2009
Sybil Nodes Detection Based on Received Signal Strength Variations within VANET PDF available

Author(s): Mohamed Salah Bouassida | Gilles Guette | Mohamed Shawky | Bertrand Ducourthial
Volume: 9
Issue: 1
Year: 2009
Efficient Nonce-based Authentication Scheme for Session Initiation Protocol PDF available

Author(s): Jia Lun Tsai
Volume: 9
Issue: 1
Year: 2009
Remark on Shao et al.'s Bidirectional Proxy Re-signature Scheme in Indocrypt'07 PDF available

Author(s): Kitae Kim | Ikkwon Yie | Seongan Lim
Volume: 9
Issue: 1
Year: 2009
Secure Two-party Protocols for Point Inclusion Problem PDF available

Author(s): Tony Thomas
Volume: 9
Issue: 1
Year: 2009
Cryptanalysis of Two RFID Authentication Protocols PDF available

Author(s): Tianjie Cao | Peng Shen
Volume: 9
Issue: 1
Year: 2009
A Survey on Distributed Access Control Systems for Web Business Processes PDF available

Author(s): Hristo Koshutanski
Volume: 9
Issue: 1
Year: 2009
On the Order of Round Components in the AES PDF available

Author(s): Jorge Nakahara Jr
Volume: 9
Issue: 1
Year: 2009
Improvement on a Trapdoor Hash Function PDF available

Author(s): Fuw-Yi Yang
Volume: 9
Issue: 1
Year: 2009
Concurrency Control for Multilevel Secure Databases PDF available

Author(s): Navdeep Kaur | Rajwinder Singh | Manoj Misra | A. K. Sarje
Volume: 9
Issue: 1
Year: 2009
An Anonymous Sealed-bid Electronic Auction Based on Ring Signature PDF available

Author(s): Hu Xiong | Zhiguang Qin | Fagen Li
Volume: 8
Issue: 3
Year: 2009
Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks PDF available

Author(s): Abedelaziz Mohaisen | DaeHun Nyang | KyungHee Lee
Volume: 8
Issue: 3
Year: 2009
Agent-based Intrusion Detection For Network-based Application PDF available

Author(s): Jianping Zeng | Donghui Guo
Volume: 8
Issue: 3
Year: 2009
On a Family of Minimal Candidate One-way Functions and One-way Permutations PDF available

Author(s): Danilo Gligoroski
Volume: 8
Issue: 3
Year: 2009
Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack PDF available

Author(s): Chunbo Ma | Jun Ao
Volume: 8
Issue: 3
Year: 2009
A Related Key Attack on the Feistel Type Block Ciphers PDF available

Author(s): Ali Bagherzandi | Mahmoud Salmasizadeh | Javad Mohajeri
Volume: 8
Issue: 3
Year: 2009
LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption PDF available

Author(s): Somanath Tripathy | Sukumar Nandi
Volume: 8
Issue: 3
Year: 2009
Edon-R, An Infinite Family of Cryptographic Hash Functions PDF available

Author(s): Danilo Gligoroski | Smile Markovski | Ljupco Kocarev
Volume: 8
Issue: 3
Year: 2009
Provably Secure Identity-based Threshold Key Escrow from Pairing PDF available

Author(s): Yu Long | Zheng Gong | Kefei Chen | Shengli Liu
Volume: 8
Issue: 3
Year: 2009
Toward a Practical Packet Marking Approach for IP Traceback PDF available

Author(s): Chao Gong | Kamil Sarac
Volume: 8
Issue: 3
Year: 2009
Policy-driven and Content-based Web Services Security Gateway PDF available

Author(s): Zein Radwan | Camille Gaspard | Ayman Kayssi | Ali Chehab
Volume: 8
Issue: 3
Year: 2009
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks PDF available

Author(s): Biju Issac
Volume: 8
Issue: 2
Year: 2009
Remarks on Zhang-Kim's Key Authentication Scheme PDF available

Author(s): Jie Liu | Jianhua Li
Volume: 8
Issue: 2
Year: 2009
Virtual Invisible Disk Design for Information System Security PDF available

Author(s): Faisal Nabi
Volume: 8
Issue: 2
Year: 2009
Ordered Semiring-based Trust Establish Model with Risk Evaluating PDF available

Author(s): Mingwu Zhang | Bo Yang | Shenglin Zhu | Wenzheng Zhang
Volume: 8
Issue: 2
Year: 2009
Rank Functions Based Inference System for Group Key Management Protocols Verification PDF available

Author(s): Amjad Gawanmeh | Adel Bouhoula | Sofiene Tahar
Volume: 8
Issue: 2
Year: 2009
RPA Switzerland

RPA Switzerland

Robotic process automation

    

Tango Rapperswil
Tango Rapperswil