International Journal of Network Security | ||
1. | Threshold Signatures: Current Status and Key Issues
|
|
Min-Shiang Hwang and Ting-Yi Chang, Vol. 1, No. 3, 2005, pp. 123-137 Article Full Text PDF |
||
2. | The Utility of Partial Knowledge in Behavior Models: An Evaluation for Intrusion Detection
|
|
Zhuowei Li and Amitabha Das, Vol. 1, No. 3, 2005, pp. 138-146 Article Full Text PDF |
||
3. | Two Attacks on the Wu-Hsu User Identification Scheme
|
|
Cheng-Chi Lee, Vol. 1, No. 3, 2005, pp. 147-148 Article Full Text PDF |
||
4. | Co-operative Private Equality Test
|
|
Ronghua Li and Chuankun Wu, Vol. 1, No. 3, 2005, pp. 149-153 Article Full Text PDF |
||
5. | Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols
|
|
Kim-Kwang Raymond Choo, Vol. 1, No. 3, 2005, pp. 154-160 Article Full Text PDF |
||
6. | The Wireless Application Protocol
|
|
Dave Singelee and Bart Preneel, Vol. 1, No. 3, 2005, pp. 161-165 Article Full Text PDF |
||
7. | On the Authentication of the User from the Remote Autonomous Object
|
|
Amit K Awasthi, Vol. 1, No. 3, 2005, pp. 166-167 Article Full Text PDF |
||
8. | Comment on the Public Key Substitution Attacks
|
|
Xiaofeng Chen, Fangguo Zhang, and Baodian Wei, Vol. 1, No. 3, 2005, pp. 168-172 Article Full Text PDF |
||
9. | Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control
|
|
Deholo Nali, Carlisle Adams, and Ali Miri, Vol. 1, No. 3, 2005, pp. 173-182 Article Full Text PDF |
||
10. | Subject index to volume 1 (2005)
|
|
Article Full Text PDF | ||
11. | Author index to volume 1 (2005)
|
|
Article Full Text PDF | ||
12. | Reviewer index to volume 1 (2005)
|
|
Article Full Text PDF | ||