Quick Search:

Volume: 1, No: 3 (November 1, 2005)

International Journal of Network Security

Volume: 1, No. 3 (Cover-v1-n3.jpg)
1. Threshold Signatures: Current Status and Key Issues
Min-Shiang Hwang and Ting-Yi Chang, Vol. 1, No. 3, 2005, pp. 123-137
Article Full Text PDF

2. The Utility of Partial Knowledge in Behavior Models: An Evaluation for Intrusion Detection
Zhuowei Li and Amitabha Das, Vol. 1, No. 3, 2005, pp. 138-146
Article Full Text PDF

3. Two Attacks on the Wu-Hsu User Identification Scheme
Cheng-Chi Lee, Vol. 1, No. 3, 2005, pp. 147-148
Article Full Text PDF

4. Co-operative Private Equality Test
Ronghua Li and Chuankun Wu, Vol. 1, No. 3, 2005, pp. 149-153
Article Full Text PDF

5. Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols
Kim-Kwang Raymond Choo, Vol. 1, No. 3, 2005, pp. 154-160
Article Full Text PDF

6. The Wireless Application Protocol
Dave Singelee and Bart Preneel, Vol. 1, No. 3, 2005, pp. 161-165
Article Full Text PDF

7. On the Authentication of the User from the Remote Autonomous Object
Amit K Awasthi, Vol. 1, No. 3, 2005, pp. 166-167
Article Full Text PDF

8. Comment on the Public Key Substitution Attacks
Xiaofeng Chen, Fangguo Zhang, and Baodian Wei, Vol. 1, No. 3, 2005, pp. 168-172
Article Full Text PDF

9. Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control
Deholo Nali, Carlisle Adams, and Ali Miri, Vol. 1, No. 3, 2005, pp. 173-182
Article Full Text PDF

10. Subject index to volume 1 (2005)
Article Full Text PDF

11. Author index to volume 1 (2005)
Article Full Text PDF

12. Reviewer index to volume 1 (2005)
Article Full Text PDF