Quick Search:

Volume: 10, No: 2 (March 1, 2010)

International Journal of Network Security

Volume: 10, No. 2 (Cover-v10-n2.jpg)
1. Design Universal Security Scheme for Broadband Router
Xiaozhuo Gu and Jianzu Yang, Vol. 10, No. 2, 2010, pp. 81-86
Article Full Text PDF

2. Integrated Intrusion Detection System Using Soft Computing
S Selvakani Kandeeban and Rengan S Rajesh, Vol. 10, No. 2, 2010, pp. 87-92
Article Full Text PDF

3. Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
Aikaterini Mitrokotsa, Nikos Komninos, and Christos Douligeris, Vol. 10, No. 2, 2010, pp. 93-106
Article Full Text PDF

4. Computing the Modular Inverse of a Polynomial Function over GF(2^P) Using Bit Wise Operation
Rajaram Ramasamy and Amutha Prabakar Muniyandi, Vol. 10, No. 2, 2010, pp. 107-113
Article Full Text PDF

5. Verifiable Attribute Based Encryption
Qiang Tang and Dongyao Ji, Vol. 10, No. 2, 2010, pp. 114-120
Article Full Text PDF

6. MOSAR: A Secured On-demand Routing Protocol for Mobile Multilevel Ad Hoc Networks
Hongwei Li and Atam P. Dhawan, Vol. 10, No. 2, 2010, pp. 121-134
Article Full Text PDF

7. Lightweight PKI for WSN uPKI
Benamar Kadri, Mohammed Feham, and Abdallah M'hamed, Vol. 10, No. 2, 2010, pp. 135-141
Article Full Text PDF

8. Automatic Multi-step Attack Pattern Discovering
Li Wang, Ali Ghorbani, and Yao Li, Vol. 10, No. 2, 2010, pp. 142-152
Article Full Text PDF

9. Provable Partial Key Escrow
Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, and Samuel S. Wagstaff, Jr., Vol. 10, No. 2, 2010, pp. 153-156
Article Full Text PDF

10. Accelerating RSA Encryption Using Random Precalculations
Loránd Szőllősi, Tamás Marosits, and Gábor Fehér, Vol. 10, No. 2, 2010, pp. 157-160
Article Full Text PDF

11. Subject index to volume 10 (2010)
Article Full Text PDF

12. Author index to volume 10 (2010)
Article Full Text PDF

13. Reviewer index to volume 10 (2010)
Article Full Text PDF