| International Journal of Network Security | ||
| 1. | Certificateless Group Oriented Signature Secure Against Key Replacement Attack
|
|
| Chunbo Ma and Jun Ao, Vol. 12, No. 1, 2011, pp. 1-6 Article Full Text PDF |
||
| 2. | Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
|
|
| R. Rajaram Ramasamy and M. Amutha Prabakar, Vol. 12, No. 1, 2011, pp. 7-12 Article Full Text PDF |
||
| 3. | New Real Time Multicast Authentication Protocol
|
|
| Riham Abdellatif, Heba Kamal Aslan, and Salwa H. Elramly, Vol. 12, No. 1, 2011, pp. 13-20 Article Full Text PDF |
||
| 4. | Fault Attack and Countermeasures on Pairing Based Cryptography
|
|
| Santosh Ghosh, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury, Vol. 12, No. 1, 2011, pp. 21-28 Article Full Text PDF |
||
| 5. | Designing a Secure Framework Method for Secure Business Application Logic Integrity in e-Commerce Systems
|
|
| Faisal Nabi, Vol. 12, No. 1, 2011, pp. 29-41 Article Full Text PDF |
||
| 6. | Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks
|
|
| Peyman Kabiri and Mehran Aghaei, Vol. 12, No. 1, 2011, pp. 42-49 Article Full Text PDF |
||
| 7. | Multibiometric Based Secure Encryption and Authentication Scheme with Fuzzy Extractor
|
|
| Mingwu Zhang, Bo Yang, Wenzheng Zhang, and Tsuyoshi Takagi, Vol. 12, No. 1, 2011, pp. 50-57 Article Full Text PDF |
||
| 8. | Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme
|
|
| Chi-Yu Liu, Cheng-Chi Lee, and Tzu-Chun Lin, Vol. 12, No. 1, 2011, pp. 58-60 Article Full Text PDF |
||
| 9. | Subject index to volume 12 (2011)
|
|
| Article Full Text PDF | ||
| 10. | Author index to volume 12 (2011)
|
|
| Article Full Text PDF | ||
| 11. | Reviewer index to volume 12 (2011)
|
|
| Article Full Text PDF | ||