International Journal of Network Security | ||
1. | A Novel Digital Envelope Approach for A Secure E-Commerce Channel
|
|
Ramachandran Ganesan, Mohan Gobi, and Kanniappan Vivekanandan, Vol. 11, No. 3, 2010, pp. 121-127 Article Full Text PDF |
||
2. | Performance Evaluation of Mobility Speed over MANET Routing Protocols
|
|
Yasser Kamal Hassan, Mohamed Hashim Abd El-Aziz, and Ahmed Safwat Abd El-Radi, Vol. 11, No. 3, 2010, pp. 128-138 Article Full Text PDF |
||
3. | Formal Specification of Common Criteria Based Access Control Policy Model
|
|
Manpreet Singh and Manjeet S. Patterh, Vol. 11, No. 3, 2010, pp. 139-148 Article Full Text PDF |
||
4. | Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves
|
|
Zhixiong Chen, Li Xu, and Chenhuang Wu, Vol. 11, No. 3, 2010, pp. 149-154 Article Full Text PDF |
||
5. | Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves
|
|
Sameh M. Shohdy, Ashraf B. El-Sisi, and Nabil Ismail, Vol. 11, No. 3, 2010, pp. 155-162 Article Full Text PDF |
||
6. | Phishing Secrets: History, Effects, and Countermeasures
|
|
Antonio San Martino and Xavier Perramon, Vol. 11, No. 3, 2010, pp. 163-171 Article Full Text PDF |
||
7. | A New Model Based Encryption Mechanism With Time Stamp and Acknowledgement Support
|
|
A. V. N. Krishna and A. Vinaya Babu, Vol. 11, No. 3, 2010, pp. 172-176 Article Full Text PDF |
||
8. | On the Security of Yuan et al.'s Undeniable Signature Scheme
|
|
Wei Zhao, Vol. 11, No. 3, 2010, pp. 177-180 Article Full Text PDF |
||
9. | Subject index to volume 11 (2010)
|
|
Article Full Text PDF | ||
10. | Author index to volume 11 (2010)
|
|
Article Full Text PDF | ||
11. | Reviewer index to volume 11 (2010)
|
|
Article Full Text PDF | ||