International Journal of Network Security | ||
1. | Research Issues and Challenges for Multiple Digital Signatures
|
|
Min-Shiang Hwang and Cheng-Chi Lee, Vol. 1, No. 1, 2005, pp. 1-7 Article Full Text PDF |
||
2. | A Scheme for Key Management on Alternate Temporal Key Hash
|
|
Song-Kong Chong, Hsien-Chu Wu, and Chia-Chun Wu, Vol. 1, No. 1, 2005, pp. 8-13 Article Full Text PDF |
||
3. | An Efficient Authentication Scheme between MANET and WLAN on IPv6 Based Internet
|
|
Ching-Wen Chen, Ming-Chin Chuang, and Chwei-Shyong Tsai, Vol. 1, No. 1, 2005, pp. 14-23 Article Full Text PDF |
||
4. | Improvement of Threshold Signature Using Self-certified Public Keys
|
|
Zuhua Shao, Vol. 1, No. 1, 2005, pp. 24-31 Article Full Text PDF |
||
5. | A Lightweight Security Mechanism for ATM Networks
|
|
Ching-Yung Liu, Vol. 1, No. 1, 2005, pp. 32-37 Article Full Text PDF |
||
6. | A Secure Mobile IP Registration Protocol
|
|
Cheng-Ying Yang and Cheng-Yeh Shiu, Vol. 1, No. 1, 2005, pp. 38-45 Article Full Text PDF |
||
7. | Privacy Preserving K-nearest Neighbor Classification
|
|
Justin Zhan, LiWu Chang, and Stan Matwin, Vol. 1, No. 1, 2005, pp. 46-51 Article Full Text PDF |
||
8. | The PYRAMIDS Block Cipher
|
|
Hussein Ahmad Al Hassan, Magdy Saeb, and Hassan Desoky Hamed, Vol. 1, No. 1, 2005, pp. 52-60 Article Full Text PDF |
||
9. | Subject index to volume 1 (2005)
|
|
Article Full Text PDF | ||
10. | Author index to volume 1 (2005)
|
|
Article Full Text PDF | ||
11. | Reviewer index to volume 1 (2005)
|
|
Article Full Text PDF | ||