Quick Search:

Volume: 10, No: 1 (January 1, 2010)

International Journal of Network Security

Volume: 10, No. 1 (Cover-v10-n1.jpg)
1. Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code
I-Shi Lee and Wen-Hsiang Tsai, Vol. 10, No. 1, 2010, pp. 1-10
Article Full Text PDF

2. Finding Traitors in Secure Networks Using Byzantine Agreements
Liam Wagner and Stuart McDonald, Vol. 10, No. 1, 2010, pp. 11-17
Article Full Text PDF

3. Return on Information Security Investment - The Viability Of An Anti-Spam Solution In A Wireless Environment
Adrian Mizzi, Vol. 10, No. 1, 2010, pp. 18-24
Article Full Text PDF

4. New Efficient Searchable Encryption Schemes from Bilinear Pairings
Chunxiang Gu and Yuefei Zhu, Vol. 10, No. 1, 2010, pp. 25-31
Article Full Text PDF

5. A Random Bit Generator Using Chaotic Maps
Narendra K Pareek, Vinod Patidar, and Krishan K Sud, Vol. 10, No. 1, 2010, pp. 32-38
Article Full Text PDF

6. An Autonomous Framework for Early Detection of Spoofed Flooding Attacks
Malliga Subramanian and Tamilarasi Angamuthu, Vol. 10, No. 1, 2010, pp. 39-50
Article Full Text PDF

7. Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
Mohsen Toorani and Ali Asghar Beheshti Shirazi, Vol. 10, No. 1, 2010, pp. 51-56
Article Full Text PDF

8. A Note on the Constructions of Orthomorphic Permutations
Jianqin Zhou, Vol. 10, No. 1, 2010, pp. 57-61
Article Full Text PDF

9. Detecting Connection-Chains: A Data Mining Approach
Ahmad Almulhem and Issa Traore, Vol. 10, No. 1, 2010, pp. 62-74
Article Full Text PDF

10. Identity-based Threshold Signature Secure in the Standard Model
Hu Xiong , Zhiguang Qin, and Fagen Li, Vol. 10, No. 1, 2010, pp. 75-80
Article Full Text PDF

11. Subject index to volume 10 (2010)
Article Full Text PDF

12. Author index to volume 10 (2010)
Article Full Text PDF

13. Reviewer index to volume 10 (2010)
Article Full Text PDF