International Journal of Network Security | ||
1. | Design Universal Security Scheme for Broadband Router
|
|
Xiaozhuo Gu and Jianzu Yang, Vol. 10, No. 2, 2010, pp. 81-86 Article Full Text PDF |
||
2. | Integrated Intrusion Detection System Using Soft Computing
|
|
S Selvakani Kandeeban and Rengan S Rajesh, Vol. 10, No. 2, 2010, pp. 87-92 Article Full Text PDF |
||
3. | Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
|
|
Aikaterini Mitrokotsa, Nikos Komninos, and Christos Douligeris, Vol. 10, No. 2, 2010, pp. 93-106 Article Full Text PDF |
||
4. | Computing the Modular Inverse of a Polynomial Function over GF(2^P) Using Bit Wise Operation
|
|
Rajaram Ramasamy and Amutha Prabakar Muniyandi, Vol. 10, No. 2, 2010, pp. 107-113 Article Full Text PDF |
||
5. | Verifiable Attribute Based Encryption
|
|
Qiang Tang and Dongyao Ji, Vol. 10, No. 2, 2010, pp. 114-120 Article Full Text PDF |
||
6. | MOSAR: A Secured On-demand Routing Protocol for Mobile Multilevel Ad Hoc Networks
|
|
Hongwei Li and Atam P. Dhawan, Vol. 10, No. 2, 2010, pp. 121-134 Article Full Text PDF |
||
7. | Lightweight PKI for WSN uPKI
|
|
Benamar Kadri, Mohammed Feham, and Abdallah M'hamed, Vol. 10, No. 2, 2010, pp. 135-141 Article Full Text PDF |
||
8. | Automatic Multi-step Attack Pattern Discovering
|
|
Li Wang, Ali Ghorbani, and Yao Li, Vol. 10, No. 2, 2010, pp. 142-152 Article Full Text PDF |
||
9. | Provable Partial Key Escrow
|
|
Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, and Samuel S. Wagstaff, Jr., Vol. 10, No. 2, 2010, pp. 153-156 Article Full Text PDF |
||
10. | Accelerating RSA Encryption Using Random Precalculations
|
|
Loránd Szőllősi, Tamás Marosits, and Gábor Fehér, Vol. 10, No. 2, 2010, pp. 157-160 Article Full Text PDF |
||
11. | Subject index to volume 10 (2010)
|
|
Article Full Text PDF | ||
12. | Author index to volume 10 (2010)
|
|
Article Full Text PDF | ||
13. | Reviewer index to volume 10 (2010)
|
|
Article Full Text PDF | ||