| International Journal of Network Security | ||
![]() |
||
| 1. | Authenticated Encryption Schemes: Current Status and Key Issues
|
|
| Min-Shiang Hwang and Chi-Yu Liu, Vol. 1, No. 2, 2005, pp. 61-73 Article Full Text PDF |
||
| 2. | Cryptanalysis of a Secure One-time Password Authentication Scheme with Low-communication for Mobile Communications
|
|
| Hsien-Chu Wu, Chi-Yu Liu, and Shu-Fen Chiou, Vol. 1, No. 2, 2005, pp. 74-76 Article Full Text PDF |
||
| 3. | A Simple Attack on a Recently Introduced Hash-based Strong-password Authentication Scheme
|
|
| Minho Kim and Çtin Kaya Koç, Vol. 1, No. 2, 2005, pp. 77-80 Article Full Text PDF |
||
| 4. | Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object
|
|
| Cheng-Ying Yang, Cheng-Chi Lee, and Shu-Yin Hsiao, Vol. 1, No. 2, 2005, pp. 81-83 Article Full Text PDF |
||
| 5. | Research on Intrusion Detection and Response: A Survey
|
|
| Peyman Kabiri and Ali Ghorbani, Vol. 1, No. 2, 2005, pp. 84-102 Article Full Text PDF |
||
| 6. | Access Control in Networks Hierarchy: Implementation of Key Management Protocol
|
|
| Nicolas Sklavos and Odysseas Koufopavlou, Vol. 1, No. 2, 2005, pp. 103-109 Article Full Text PDF |
||
| 7. | Self-healing Group Key Distribution
|
|
| Muhammad Junaid Bohio and Ali Miri, Vol. 1, No. 2, 2005, pp. 110-117 Article Full Text PDF |
||
| 8. | Cryptanalysis of a New Efficient MAKEP for Wireless Communications
|
|
| Jau-Ji Shen, Ching-Ying Lin, and Hung-Wen Yang, Vol. 1, No. 2, 2005, pp. 118-121 Article Full Text PDF |
||
| 9. | Subject index to volume 1 (2005)
|
|
| Article Full Text PDF | ||
| 10. | Author index to volume 1 (2005)
|
|
| Article Full Text PDF | ||
| 11. | Reviewer index to volume 1 (2005)
|
|
| Article Full Text PDF | ||