| International Journal of Network Security | ||
![]() |
||
| 1. | Research Issues and Challenges for Multiple Digital Signatures
|
|
| Min-Shiang Hwang and Cheng-Chi Lee, Vol. 1, No. 1, 2005, pp. 1-7 Article Full Text PDF |
||
| 2. | A Scheme for Key Management on Alternate Temporal Key Hash
|
|
| Song-Kong Chong, Hsien-Chu Wu, and Chia-Chun Wu, Vol. 1, No. 1, 2005, pp. 8-13 Article Full Text PDF |
||
| 3. | An Efficient Authentication Scheme between MANET and WLAN on IPv6 Based Internet
|
|
| Ching-Wen Chen, Ming-Chin Chuang, and Chwei-Shyong Tsai, Vol. 1, No. 1, 2005, pp. 14-23 Article Full Text PDF |
||
| 4. | Improvement of Threshold Signature Using Self-certified Public Keys
|
|
| Zuhua Shao, Vol. 1, No. 1, 2005, pp. 24-31 Article Full Text PDF |
||
| 5. | A Lightweight Security Mechanism for ATM Networks
|
|
| Ching-Yung Liu, Vol. 1, No. 1, 2005, pp. 32-37 Article Full Text PDF |
||
| 6. | A Secure Mobile IP Registration Protocol
|
|
| Cheng-Ying Yang and Cheng-Yeh Shiu, Vol. 1, No. 1, 2005, pp. 38-45 Article Full Text PDF |
||
| 7. | Privacy Preserving K-nearest Neighbor Classification
|
|
| Justin Zhan, LiWu Chang, and Stan Matwin, Vol. 1, No. 1, 2005, pp. 46-51 Article Full Text PDF |
||
| 8. | The PYRAMIDS Block Cipher
|
|
| Hussein Ahmad Al Hassan, Magdy Saeb, and Hassan Desoky Hamed, Vol. 1, No. 1, 2005, pp. 52-60 Article Full Text PDF |
||
| 9. | Subject index to volume 1 (2005)
|
|
| Article Full Text PDF | ||
| 10. | Author index to volume 1 (2005)
|
|
| Article Full Text PDF | ||
| 11. | Reviewer index to volume 1 (2005)
|
|
| Article Full Text PDF | ||