International Journal of Network Security | ||
1. | Efficient Cancelable Biometric Key Generation Scheme for Cryptography
|
|
Sunil V. K. Gaddam and Manohar Lal, Vol. 11, No. 2, 2010, pp. 61-69 Article Full Text PDF |
||
2. | Speeding Scalar Multiplication of Elliptic Curve over GF(2^mn)
|
|
Ding Yong, Yin-Fang Hong, Wei-Tao Wang, Yuan-Yuan Zhou, and Xiao-Yang Zhao, Vol. 11, No. 2, 2010, pp. 70-77 Article Full Text PDF |
||
3. | Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
|
|
Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, and Mohiy Mohamed Hadhoud, Vol. 11, No. 2, 2010, pp. 78-87 Article Full Text PDF |
||
4. | A New Secure Remote User Authentication Scheme with Smart Cards
|
|
Manoj Kumar, Vol. 11, No. 2, 2010, pp. 88-93 Article Full Text PDF |
||
5. | The Structure of a Signature via the Net
|
|
Chuen Chuan Huang, Chuen-Der Huang, and Shin Ya Huang, Vol. 11, No. 2, 2010, pp. 94-105 Article Full Text PDF |
||
6. | Blind Collective Signature Protocol Based on Discrete Logarithm Problem
|
|
Nikolay A. Moldovyan and Alexander A. Moldovyan , Vol. 11, No. 2, 2010, pp. 106-113 Article Full Text PDF |
||
7. | A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol
|
|
Jie Liu and Jianhua Li, Vol. 11, No. 2, 2010, pp. 114-117 Article Full Text PDF |
||
8. | An MSS Based on the Elliptic Curve Cryptosystem
|
|
Hemlal Sahu and Birendra Kumar Sharma, Vol. 11, No. 2, 2010, pp. 118-120 Article Full Text PDF |
||
9. | Subject index to volume 11 (2010)
|
|
Article Full Text PDF | ||
10. | Author index to volume 11 (2010)
|
|
Article Full Text PDF | ||
11. | Reviewer index to volume 11 (2010)
|
|
Article Full Text PDF | ||