International Journal of Network Security | ||
1. | Authenticated Encryption Schemes: Current Status and Key Issues
|
|
Min-Shiang Hwang and Chi-Yu Liu, Vol. 1, No. 2, 2005, pp. 61-73 Article Full Text PDF |
||
2. | Cryptanalysis of a Secure One-time Password Authentication Scheme with Low-communication for Mobile Communications
|
|
Hsien-Chu Wu, Chi-Yu Liu, and Shu-Fen Chiou, Vol. 1, No. 2, 2005, pp. 74-76 Article Full Text PDF |
||
3. | A Simple Attack on a Recently Introduced Hash-based Strong-password Authentication Scheme
|
|
Minho Kim and Çtin Kaya Koç, Vol. 1, No. 2, 2005, pp. 77-80 Article Full Text PDF |
||
4. | Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object
|
|
Cheng-Ying Yang, Cheng-Chi Lee, and Shu-Yin Hsiao, Vol. 1, No. 2, 2005, pp. 81-83 Article Full Text PDF |
||
5. | Research on Intrusion Detection and Response: A Survey
|
|
Peyman Kabiri and Ali Ghorbani, Vol. 1, No. 2, 2005, pp. 84-102 Article Full Text PDF |
||
6. | Access Control in Networks Hierarchy: Implementation of Key Management Protocol
|
|
Nicolas Sklavos and Odysseas Koufopavlou, Vol. 1, No. 2, 2005, pp. 103-109 Article Full Text PDF |
||
7. | Self-healing Group Key Distribution
|
|
Muhammad Junaid Bohio and Ali Miri, Vol. 1, No. 2, 2005, pp. 110-117 Article Full Text PDF |
||
8. | Cryptanalysis of a New Efficient MAKEP for Wireless Communications
|
|
Jau-Ji Shen, Ching-Ying Lin, and Hung-Wen Yang, Vol. 1, No. 2, 2005, pp. 118-121 Article Full Text PDF |
||
9. | Subject index to volume 1 (2005)
|
|
Article Full Text PDF | ||
10. | Author index to volume 1 (2005)
|
|
Article Full Text PDF | ||
11. | Reviewer index to volume 1 (2005)
|
|
Article Full Text PDF | ||