Quick Search:

Volume: 11, No: 3 (November 1, 2010)

International Journal of Network Security

1. A Novel Digital Envelope Approach for A Secure E-Commerce Channel
Ramachandran Ganesan, Mohan Gobi, and Kanniappan Vivekanandan, Vol. 11, No. 3, 2010, pp. 121-127
Article Full Text PDF

2. Performance Evaluation of Mobility Speed over MANET Routing Protocols
Yasser Kamal Hassan, Mohamed Hashim Abd El-Aziz, and Ahmed Safwat Abd El-Radi, Vol. 11, No. 3, 2010, pp. 128-138
Article Full Text PDF

3. Formal Specification of Common Criteria Based Access Control Policy Model
Manpreet Singh and Manjeet S. Patterh, Vol. 11, No. 3, 2010, pp. 139-148
Article Full Text PDF

4. Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves
Zhixiong Chen, Li Xu, and Chenhuang Wu, Vol. 11, No. 3, 2010, pp. 149-154
Article Full Text PDF

5. Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves
Sameh M. Shohdy, Ashraf B. El-Sisi, and Nabil Ismail, Vol. 11, No. 3, 2010, pp. 155-162
Article Full Text PDF

6. Phishing Secrets: History, Effects, and Countermeasures
Antonio San Martino and Xavier Perramon, Vol. 11, No. 3, 2010, pp. 163-171
Article Full Text PDF

7. A New Model Based Encryption Mechanism With Time Stamp and Acknowledgement Support
A. V. N. Krishna and A. Vinaya Babu, Vol. 11, No. 3, 2010, pp. 172-176
Article Full Text PDF

8. On the Security of Yuan et al.'s Undeniable Signature Scheme
Wei Zhao, Vol. 11, No. 3, 2010, pp. 177-180
Article Full Text PDF

9. Subject index to volume 11 (2010)
Article Full Text PDF

10. Author index to volume 11 (2010)
Article Full Text PDF

11. Reviewer index to volume 11 (2010)
Article Full Text PDF