International Journal of Network Security  
1.  Efficient Cancelable Biometric Key Generation Scheme for Cryptography


Sunil V. K. Gaddam and Manohar Lal, Vol. 11, No. 2, 2010, pp. 6169 Article Full Text PDF 

2.  Speeding Scalar Multiplication of Elliptic Curve over GF(2^mn)


Ding Yong, YinFang Hong, WeiTao Wang, YuanYuan Zhou, and XiaoYang Zhao, Vol. 11, No. 2, 2010, pp. 7077 Article Full Text PDF 

3.  Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types


Diaa Salama Abdul Minaam, Hatem M. AbdualKader, and Mohiy Mohamed Hadhoud, Vol. 11, No. 2, 2010, pp. 7887 Article Full Text PDF 

4.  A New Secure Remote User Authentication Scheme with Smart Cards


Manoj Kumar, Vol. 11, No. 2, 2010, pp. 8893 Article Full Text PDF 

5.  The Structure of a Signature via the Net


Chuen Chuan Huang, ChuenDer Huang, and Shin Ya Huang, Vol. 11, No. 2, 2010, pp. 94105 Article Full Text PDF 

6.  Blind Collective Signature Protocol Based on Discrete Logarithm Problem


Nikolay A. Moldovyan and Alexander A. Moldovyan , Vol. 11, No. 2, 2010, pp. 106113 Article Full Text PDF 

7.  A Better Improvement on the Integrated DiffieHellmanDSA Key Agreement Protocol


Jie Liu and Jianhua Li, Vol. 11, No. 2, 2010, pp. 114117 Article Full Text PDF 

8.  An MSS Based on the Elliptic Curve Cryptosystem


Hemlal Sahu and Birendra Kumar Sharma, Vol. 11, No. 2, 2010, pp. 118120 Article Full Text PDF 

9.  Subject index to volume 11 (2010)


Article Full Text PDF  
10.  Author index to volume 11 (2010)


Article Full Text PDF  
11.  Reviewer index to volume 11 (2010)


Article Full Text PDF  