International Journal of Network Security | ||
1. | A Scalable and Distributed Security Protocol for Multicast Communications
|
|
Imane Aly Saroit, Said Fathy El-Zoghdy, and Mostafa Matar, Vol. 12, No. 2, 2011, pp. 61-74 Article Full Text PDF |
||
2. | Trust Key Management Scheme for Wireless Body Area Networks
|
|
Mohammed Mana, Mohammed Feham, and Boucif Amar Bensaber, Vol. 12, No. 2, 2011, pp. 75-83 Article Full Text PDF |
||
3. | Multi-authority Electronic Voting Scheme Based on Elliptic Curves
|
|
Chinniah Porkodi, Ramalingam Arumuganathan, and Krishnasamy Vidya, Vol. 12, No. 2, 2011, pp. 84-91 Article Full Text PDF |
||
4. | A Certificateless Proxy Ring Signature Scheme with Provable Security
|
|
Hu Xiong, Zhiguang Qin, and Fagen Li, Vol. 12, No. 2, 2011, pp. 92-106 Article Full Text PDF |
||
5. | Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
|
|
Garth V. Crosby, Lance Hester, and Niki Pissinou, Vol. 12, No. 2, 2011, pp. 107-117 Article Full Text PDF |
||
6. | Probable Security Proof of a Blind Signature Scheme over Braid Groups
|
|
Girraj Kumar Verma, Vol. 12, No. 2, 2011, pp. 118-120 Article Full Text PDF |
||
7. | Subject index to volume 12 (2011)
|
|
Article Full Text PDF | ||
8. | Author index to volume 12 (2011)
|
|
Article Full Text PDF | ||
9. | Reviewer index to volume 12 (2011)
|
|
Article Full Text PDF | ||