Quick Search:

Volume: 12, No: 2 (March 1, 2011)

International Journal of Network Security

1. A Scalable and Distributed Security Protocol for Multicast Communications
Imane Aly Saroit, Said Fathy El-Zoghdy, and Mostafa Matar, Vol. 12, No. 2, 2011, pp. 61-74
Article Full Text PDF

2. Trust Key Management Scheme for Wireless Body Area Networks
Mohammed Mana, Mohammed Feham, and Boucif Amar Bensaber, Vol. 12, No. 2, 2011, pp. 75-83
Article Full Text PDF

3. Multi-authority Electronic Voting Scheme Based on Elliptic Curves
Chinniah Porkodi, Ramalingam Arumuganathan, and Krishnasamy Vidya, Vol. 12, No. 2, 2011, pp. 84-91
Article Full Text PDF

4. A Certificateless Proxy Ring Signature Scheme with Provable Security
Hu Xiong, Zhiguang Qin, and Fagen Li, Vol. 12, No. 2, 2011, pp. 92-106
Article Full Text PDF

5. Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
Garth V. Crosby, Lance Hester, and Niki Pissinou, Vol. 12, No. 2, 2011, pp. 107-117
Article Full Text PDF

6. Probable Security Proof of a Blind Signature Scheme over Braid Groups
Girraj Kumar Verma, Vol. 12, No. 2, 2011, pp. 118-120
Article Full Text PDF

7. Subject index to volume 12 (2011)
Article Full Text PDF

8. Author index to volume 12 (2011)
Article Full Text PDF

9. Reviewer index to volume 12 (2011)
Article Full Text PDF