| International Journal of Network Security | ||
| 1. | A Scalable and Distributed Security Protocol for Multicast Communications
|
|
| Imane Aly Saroit, Said Fathy El-Zoghdy, and Mostafa Matar, Vol. 12, No. 2, 2011, pp. 61-74 Article Full Text PDF |
||
| 2. | Trust Key Management Scheme for Wireless Body Area Networks
|
|
| Mohammed Mana, Mohammed Feham, and Boucif Amar Bensaber, Vol. 12, No. 2, 2011, pp. 75-83 Article Full Text PDF |
||
| 3. | Multi-authority Electronic Voting Scheme Based on Elliptic Curves
|
|
| Chinniah Porkodi, Ramalingam Arumuganathan, and Krishnasamy Vidya, Vol. 12, No. 2, 2011, pp. 84-91 Article Full Text PDF |
||
| 4. | A Certificateless Proxy Ring Signature Scheme with Provable Security
|
|
| Hu Xiong, Zhiguang Qin, and Fagen Li, Vol. 12, No. 2, 2011, pp. 92-106 Article Full Text PDF |
||
| 5. | Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
|
|
| Garth V. Crosby, Lance Hester, and Niki Pissinou, Vol. 12, No. 2, 2011, pp. 107-117 Article Full Text PDF |
||
| 6. | Probable Security Proof of a Blind Signature Scheme over Braid Groups
|
|
| Girraj Kumar Verma, Vol. 12, No. 2, 2011, pp. 118-120 Article Full Text PDF |
||
| 7. | Subject index to volume 12 (2011)
|
|
| Article Full Text PDF | ||
| 8. | Author index to volume 12 (2011)
|
|
| Article Full Text PDF | ||
| 9. | Reviewer index to volume 12 (2011)
|
|
| Article Full Text PDF | ||