International Journal of Network Security | ||
1. | Certificateless Group Oriented Signature Secure Against Key Replacement Attack
|
|
Chunbo Ma and Jun Ao, Vol. 12, No. 1, 2011, pp. 1-6 Article Full Text PDF |
||
2. | Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
|
|
R. Rajaram Ramasamy and M. Amutha Prabakar, Vol. 12, No. 1, 2011, pp. 7-12 Article Full Text PDF |
||
3. | New Real Time Multicast Authentication Protocol
|
|
Riham Abdellatif, Heba Kamal Aslan, and Salwa H. Elramly, Vol. 12, No. 1, 2011, pp. 13-20 Article Full Text PDF |
||
4. | Fault Attack and Countermeasures on Pairing Based Cryptography
|
|
Santosh Ghosh, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury, Vol. 12, No. 1, 2011, pp. 21-28 Article Full Text PDF |
||
5. | Designing a Secure Framework Method for Secure Business Application Logic Integrity in e-Commerce Systems
|
|
Faisal Nabi, Vol. 12, No. 1, 2011, pp. 29-41 Article Full Text PDF |
||
6. | Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks
|
|
Peyman Kabiri and Mehran Aghaei, Vol. 12, No. 1, 2011, pp. 42-49 Article Full Text PDF |
||
7. | Multibiometric Based Secure Encryption and Authentication Scheme with Fuzzy Extractor
|
|
Mingwu Zhang, Bo Yang, Wenzheng Zhang, and Tsuyoshi Takagi, Vol. 12, No. 1, 2011, pp. 50-57 Article Full Text PDF |
||
8. | Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme
|
|
Chi-Yu Liu, Cheng-Chi Lee, and Tzu-Chun Lin, Vol. 12, No. 1, 2011, pp. 58-60 Article Full Text PDF |
||
9. | Subject index to volume 12 (2011)
|
|
Article Full Text PDF | ||
10. | Author index to volume 12 (2011)
|
|
Article Full Text PDF | ||
11. | Reviewer index to volume 12 (2011)
|
|
Article Full Text PDF | ||