| International Journal of Network Security | ||
| 1. | Efficient Cancelable Biometric Key Generation Scheme for Cryptography
|
|
| Sunil V. K. Gaddam and Manohar Lal, Vol. 11, No. 2, 2010, pp. 61-69 Article Full Text PDF |
||
| 2. | Speeding Scalar Multiplication of Elliptic Curve over GF(2^mn)
|
|
| Ding Yong, Yin-Fang Hong, Wei-Tao Wang, Yuan-Yuan Zhou, and Xiao-Yang Zhao, Vol. 11, No. 2, 2010, pp. 70-77 Article Full Text PDF |
||
| 3. | Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
|
|
| Diaa Salama Abdul Minaam, Hatem M. Abdual-Kader, and Mohiy Mohamed Hadhoud, Vol. 11, No. 2, 2010, pp. 78-87 Article Full Text PDF |
||
| 4. | A New Secure Remote User Authentication Scheme with Smart Cards
|
|
| Manoj Kumar, Vol. 11, No. 2, 2010, pp. 88-93 Article Full Text PDF |
||
| 5. | The Structure of a Signature via the Net
|
|
| Chuen Chuan Huang, Chuen-Der Huang, and Shin Ya Huang, Vol. 11, No. 2, 2010, pp. 94-105 Article Full Text PDF |
||
| 6. | Blind Collective Signature Protocol Based on Discrete Logarithm Problem
|
|
| Nikolay A. Moldovyan and Alexander A. Moldovyan , Vol. 11, No. 2, 2010, pp. 106-113 Article Full Text PDF |
||
| 7. | A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol
|
|
| Jie Liu and Jianhua Li, Vol. 11, No. 2, 2010, pp. 114-117 Article Full Text PDF |
||
| 8. | An MSS Based on the Elliptic Curve Cryptosystem
|
|
| Hemlal Sahu and Birendra Kumar Sharma, Vol. 11, No. 2, 2010, pp. 118-120 Article Full Text PDF |
||
| 9. | Subject index to volume 11 (2010)
|
|
| Article Full Text PDF | ||
| 10. | Author index to volume 11 (2010)
|
|
| Article Full Text PDF | ||
| 11. | Reviewer index to volume 11 (2010)
|
|
| Article Full Text PDF | ||