Quick Search:

Volume: 11, No: 2 (September 1, 2010)

International Journal of Network Security

1. Efficient Cancelable Biometric Key Generation Scheme for Cryptography
Sunil V. K. Gaddam and Manohar Lal, Vol. 11, No. 2, 2010, pp. 61-69
Article Full Text PDF

2. Speeding Scalar Multiplication of Elliptic Curve over GF(2^mn)
Ding Yong, Yin-Fang Hong, Wei-Tao Wang, Yuan-Yuan Zhou, and Xiao-Yang Zhao, Vol. 11, No. 2, 2010, pp. 70-77
Article Full Text PDF

3. Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, and Mohiy Mohamed Hadhoud, Vol. 11, No. 2, 2010, pp. 78-87
Article Full Text PDF

4. A New Secure Remote User Authentication Scheme with Smart Cards
Manoj Kumar, Vol. 11, No. 2, 2010, pp. 88-93
Article Full Text PDF

5. The Structure of a Signature via the Net
Chuen Chuan Huang, Chuen-Der Huang, and Shin Ya Huang, Vol. 11, No. 2, 2010, pp. 94-105
Article Full Text PDF

6. Blind Collective Signature Protocol Based on Discrete Logarithm Problem
Nikolay A. Moldovyan and Alexander A. Moldovyan , Vol. 11, No. 2, 2010, pp. 106-113
Article Full Text PDF

7. A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol
Jie Liu and Jianhua Li, Vol. 11, No. 2, 2010, pp. 114-117
Article Full Text PDF

8. An MSS Based on the Elliptic Curve Cryptosystem
Hemlal Sahu and Birendra Kumar Sharma, Vol. 11, No. 2, 2010, pp. 118-120
Article Full Text PDF

9. Subject index to volume 11 (2010)
Article Full Text PDF

10. Author index to volume 11 (2010)
Article Full Text PDF

11. Reviewer index to volume 11 (2010)
Article Full Text PDF