| International Journal of Network Security | ||
![]() |
||
| 1. | Threshold Signatures: Current Status and Key Issues
|
|
| Min-Shiang Hwang and Ting-Yi Chang, Vol. 1, No. 3, 2005, pp. 123-137 Article Full Text PDF |
||
| 2. | The Utility of Partial Knowledge in Behavior Models: An Evaluation for Intrusion Detection
|
|
| Zhuowei Li and Amitabha Das, Vol. 1, No. 3, 2005, pp. 138-146 Article Full Text PDF |
||
| 3. | Two Attacks on the Wu-Hsu User Identification Scheme
|
|
| Cheng-Chi Lee, Vol. 1, No. 3, 2005, pp. 147-148 Article Full Text PDF |
||
| 4. | Co-operative Private Equality Test
|
|
| Ronghua Li and Chuankun Wu, Vol. 1, No. 3, 2005, pp. 149-153 Article Full Text PDF |
||
| 5. | Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols
|
|
| Kim-Kwang Raymond Choo, Vol. 1, No. 3, 2005, pp. 154-160 Article Full Text PDF |
||
| 6. | The Wireless Application Protocol
|
|
| Dave Singelee and Bart Preneel, Vol. 1, No. 3, 2005, pp. 161-165 Article Full Text PDF |
||
| 7. | On the Authentication of the User from the Remote Autonomous Object
|
|
| Amit K Awasthi, Vol. 1, No. 3, 2005, pp. 166-167 Article Full Text PDF |
||
| 8. | Comment on the Public Key Substitution Attacks
|
|
| Xiaofeng Chen, Fangguo Zhang, and Baodian Wei, Vol. 1, No. 3, 2005, pp. 168-172 Article Full Text PDF |
||
| 9. | Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control
|
|
| Deholo Nali, Carlisle Adams, and Ali Miri, Vol. 1, No. 3, 2005, pp. 173-182 Article Full Text PDF |
||
| 10. | Subject index to volume 1 (2005)
|
|
| Article Full Text PDF | ||
| 11. | Author index to volume 1 (2005)
|
|
| Article Full Text PDF | ||
| 12. | Reviewer index to volume 1 (2005)
|
|
| Article Full Text PDF | ||