International Journal of Network Security | ||
1. | Dynamic Key Cryptography and Applications
|
|
Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, and Balasubramaniam Srinivasan, Vol. 10, No. 3, 2010, pp. 161-174 Article Full Text PDF |
||
2. | An Enhanced Remote User Authentication Scheme with Smart Card
|
|
Manoj Kumar, Vol. 10, No. 3, 2010, pp. 175-184 Article Full Text PDF |
||
3. | New Binary Sequences of Period pq with Low Values of Correlation and Large Linear Complexity
|
|
Tongjiang Yan, Vol. 10, No. 3, 2010, pp. 185-189 Article Full Text PDF |
||
4. | Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
|
|
Ramanarayana Kandikattu and Lillykutty Jacob, Vol. 10, No. 3, 2010, pp. 190-203 Article Full Text PDF |
||
5. | On the Security Cost of Interval Multicast
|
|
Weifeng Chen, Ye Sun, and Anthony S. Pyzdrowski, Vol. 10, No. 3, 2010, pp. 204-212 Article Full Text PDF |
||
6. | Evaluating The Performance of Symmetric Encryption Algorithms
|
|
Diaa Salama Abd Elminaam, Hatem Mohamed Abdual Kader, and Mohiy Mohamed Hadhoud, Vol. 10, No. 3, 2010, pp. 213-219 Article Full Text PDF |
||
7. | A Provably Secure and Efficient Strong Designated Verifier Signature Scheme
|
|
Fuw-Yi Yang and Cai-Ming Liao, Vol. 10, No. 3, 2010, pp. 220-224 Article Full Text PDF |
||
8. | LOTKIP: Low Overhead TKIP Optimization for Ad Hoc Wireless Networks
|
|
M. Razvi Doomun and K. M. Sunjiv Soyjaudah, Vol. 10, No. 3, 2010, pp. 225-237 Article Full Text PDF |
||
9. | Comment on Wu et al.'s Server-aided Verification Signature Schemes
|
|
Zhiwei Wang, Licheng Wang, Yixian Yang, and Zhengming Hu, Vol. 10, No. 3, 2010, pp. 238-240 Article Full Text PDF |
||
10. | Subject index to volume 10 (2010)
|
|
Article Full Text PDF | ||
11. | Author index to volume 10 (2010)
|
|
Article Full Text PDF | ||
12. | Reviewer index to volume 10 (2010)
|
|
Article Full Text PDF | ||