Quick Search:

Volume: 10, No: 3 (May 1, 2010)

International Journal of Network Security

Volume: 10, No. 3 (Cover-v10-n3.jpg)
1. Dynamic Key Cryptography and Applications
Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, and Balasubramaniam Srinivasan, Vol. 10, No. 3, 2010, pp. 161-174
Article Full Text PDF

2. An Enhanced Remote User Authentication Scheme with Smart Card
Manoj Kumar, Vol. 10, No. 3, 2010, pp. 175-184
Article Full Text PDF

3. New Binary Sequences of Period pq with Low Values of Correlation and Large Linear Complexity
Tongjiang Yan, Vol. 10, No. 3, 2010, pp. 185-189
Article Full Text PDF

4. Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Ramanarayana Kandikattu and Lillykutty Jacob, Vol. 10, No. 3, 2010, pp. 190-203
Article Full Text PDF

5. On the Security Cost of Interval Multicast
Weifeng Chen, Ye Sun, and Anthony S. Pyzdrowski, Vol. 10, No. 3, 2010, pp. 204-212
Article Full Text PDF

6. Evaluating The Performance of Symmetric Encryption Algorithms
Diaa Salama Abd Elminaam, Hatem Mohamed Abdual Kader, and Mohiy Mohamed Hadhoud, Vol. 10, No. 3, 2010, pp. 213-219
Article Full Text PDF

7. A Provably Secure and Efficient Strong Designated Verifier Signature Scheme
Fuw-Yi Yang and Cai-Ming Liao, Vol. 10, No. 3, 2010, pp. 220-224
Article Full Text PDF

8. LOTKIP: Low Overhead TKIP Optimization for Ad Hoc Wireless Networks
M. Razvi Doomun and K. M. Sunjiv Soyjaudah, Vol. 10, No. 3, 2010, pp. 225-237
Article Full Text PDF

9. Comment on Wu et al.'s Server-aided Verification Signature Schemes
Zhiwei Wang, Licheng Wang, Yixian Yang, and Zhengming Hu, Vol. 10, No. 3, 2010, pp. 238-240
Article Full Text PDF

10. Subject index to volume 10 (2010)
Article Full Text PDF

11. Author index to volume 10 (2010)
Article Full Text PDF

12. Reviewer index to volume 10 (2010)
Article Full Text PDF