Quick Search:

Volume: 1, No: 2 (September 1, 2005)

International Journal of Network Security

Volume: 1, No. 2 (Cover-v1-n2.jpg)
1. Authenticated Encryption Schemes: Current Status and Key Issues
Min-Shiang Hwang and Chi-Yu Liu, Vol. 1, No. 2, 2005, pp. 61-73
Article Full Text PDF

2. Cryptanalysis of a Secure One-time Password Authentication Scheme with Low-communication for Mobile Communications
Hsien-Chu Wu, Chi-Yu Liu, and Shu-Fen Chiou, Vol. 1, No. 2, 2005, pp. 74-76
Article Full Text PDF

3. A Simple Attack on a Recently Introduced Hash-based Strong-password Authentication Scheme
Minho Kim and Çtin Kaya Koç, Vol. 1, No. 2, 2005, pp. 77-80
Article Full Text PDF

4. Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object
Cheng-Ying Yang, Cheng-Chi Lee, and Shu-Yin Hsiao, Vol. 1, No. 2, 2005, pp. 81-83
Article Full Text PDF

5. Research on Intrusion Detection and Response: A Survey
Peyman Kabiri and Ali Ghorbani, Vol. 1, No. 2, 2005, pp. 84-102
Article Full Text PDF

6. Access Control in Networks Hierarchy: Implementation of Key Management Protocol
Nicolas Sklavos and Odysseas Koufopavlou, Vol. 1, No. 2, 2005, pp. 103-109
Article Full Text PDF

7. Self-healing Group Key Distribution
Muhammad Junaid Bohio and Ali Miri, Vol. 1, No. 2, 2005, pp. 110-117
Article Full Text PDF

8. Cryptanalysis of a New Efficient MAKEP for Wireless Communications
Jau-Ji Shen, Ching-Ying Lin, and Hung-Wen Yang, Vol. 1, No. 2, 2005, pp. 118-121
Article Full Text PDF

9. Subject index to volume 1 (2005)
Article Full Text PDF

10. Author index to volume 1 (2005)
Article Full Text PDF

11. Reviewer index to volume 1 (2005)
Article Full Text PDF