International Journal of Network Security | ||
1. | Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code
|
|
I-Shi Lee and Wen-Hsiang Tsai, Vol. 10, No. 1, 2010, pp. 1-10 Article Full Text PDF |
||
2. | Finding Traitors in Secure Networks Using Byzantine Agreements
|
|
Liam Wagner and Stuart McDonald, Vol. 10, No. 1, 2010, pp. 11-17 Article Full Text PDF |
||
3. | Return on Information Security Investment - The Viability Of An Anti-Spam Solution In A Wireless Environment
|
|
Adrian Mizzi, Vol. 10, No. 1, 2010, pp. 18-24 Article Full Text PDF |
||
4. | New Efficient Searchable Encryption Schemes from Bilinear Pairings
|
|
Chunxiang Gu and Yuefei Zhu, Vol. 10, No. 1, 2010, pp. 25-31 Article Full Text PDF |
||
5. | A Random Bit Generator Using Chaotic Maps
|
|
Narendra K Pareek, Vinod Patidar, and Krishan K Sud, Vol. 10, No. 1, 2010, pp. 32-38 Article Full Text PDF |
||
6. | An Autonomous Framework for Early Detection of Spoofed Flooding Attacks
|
|
Malliga Subramanian and Tamilarasi Angamuthu, Vol. 10, No. 1, 2010, pp. 39-50 Article Full Text PDF |
||
7. | Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
|
|
Mohsen Toorani and Ali Asghar Beheshti Shirazi, Vol. 10, No. 1, 2010, pp. 51-56 Article Full Text PDF |
||
8. | A Note on the Constructions of Orthomorphic Permutations
|
|
Jianqin Zhou, Vol. 10, No. 1, 2010, pp. 57-61 Article Full Text PDF |
||
9. | Detecting Connection-Chains: A Data Mining Approach
|
|
Ahmad Almulhem and Issa Traore, Vol. 10, No. 1, 2010, pp. 62-74 Article Full Text PDF |
||
10. | Identity-based Threshold Signature Secure in the Standard Model
|
|
Hu Xiong , Zhiguang Qin, and Fagen Li, Vol. 10, No. 1, 2010, pp. 75-80 Article Full Text PDF |
||
11. | Subject index to volume 10 (2010)
|
|
Article Full Text PDF | ||
12. | Author index to volume 10 (2010)
|
|
Article Full Text PDF | ||
13. | Reviewer index to volume 10 (2010)
|
|
Article Full Text PDF | ||