International Journal of Network Security | ||
1. | A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps
|
|
Ismail Amr Ismail, Mohammed Amin, and Hossam Diab, Vol. 11, No. 1, 2010, pp. 1-10 Article Full Text PDF |
||
2. | A Modified Hill Cipher Involving Interweaving and Iteration
|
|
V. Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani, Vol. 11, No. 1, 2010, pp. 11-16 Article Full Text PDF |
||
3. | An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing
|
|
Zeng Yong, Ma Jianfeng, and SangJae Moon, Vol. 11, No. 1, 2010, pp. 17-22 Article Full Text PDF |
||
4. | Nonce Generation For The Digital Signature Standard
|
|
Raj S. Katti and Rajesh G. Kavasseri, Vol. 11, No. 1, 2010, pp. 23-32 Article Full Text PDF |
||
5. | Secure Group Key Management Scheme for Multicast Networks
|
|
R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanagaraj, R. Chidambaram Kalimuthu, and R. Dharmaraj, Vol. 11, No. 1, 2010, pp. 33-38 Article Full Text PDF |
||
6. | Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks
|
|
Fangwei Wang, Yunkai Zhang, and Jianfeng Ma, Vol. 11, No. 1, 2010, pp. 39-45 Article Full Text PDF |
||
7. | Simplified IPSec Protocol Stack for Micro Server
|
|
Nguyen Thanh Hoa, Kensuke Naoe, and Yoshiyasu Takefuji, Vol. 11, No. 1, 2010, pp. 46-54 Article Full Text PDF |
||
8. | Cryptanalysis of Security Enhancement for a Modified Authenticated Key Agreement Protocol
|
|
Kou-Min Cheng, Ting-Yi Chang, Jung-Wen Lo, Vol. 11, No. 1, 2010, pp. 55-57 Article Full Text PDF |
||
9. | A Note On Self-Shrinking Lagged Fibonacci Generator
|
|
Moon K. Chetry and W. B. Vasantha Kandaswamy, Vol. 11, No. 1, 2010, pp. 58-60 Article Full Text PDF |
||
10. | Subject index to volume 11 (2010)
|
|
Article Full Text PDF | ||
11. | Author index to volume 11 (2010)
|
|
Article Full Text PDF | ||
12. | Reviewer index to volume 11 (2010)
|
|
Article Full Text PDF | ||