| International Journal of Network Security | ||
| 1. | Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
|
|
| Hussein Al-Bahadili, Shakir M. Hussain, Ghassan Issa, and Khaled El-Zayyat, Vol. 12, No. 3, 2011, pp. 121-129 Article Full Text PDF |
||
| 2. | Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings
|
|
| Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, and Tsuyoshi Takagi, Vol. 12, No. 3, 2011, pp. 130-136 Article Full Text PDF |
||
| 3. | Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
|
|
| S. V. Sathyanarayana, M. Aswatha Kumar, and K. N. Hari Bhat, Vol. 12, No. 3, 2011, pp. 137-150 Article Full Text PDF |
||
| 4. | Elliptic Curve Cryptosystems and Side-channel Attacks
|
|
| Ekambaram Kesavulu Reddy, Vol. 12, No. 3, 2011, pp. 151-158 Article Full Text PDF |
||
| 5. | An Authentication Protocol Based on Kerberos 5
|
|
| Eman El-Emam, Magdy Koutb, Hamdy Kelash, and Osama S. Faragallah, Vol. 12, No. 3, 2011, pp. 159-170 Article Full Text PDF |
||
| 6. | An Anonymous Auction Protocol Based on GDH Assumption
|
|
| Fuw-Yi Yang and Cai-Ming Liao, Vol. 12, No. 3, 2011, pp. 171-177 Article Full Text PDF |
||
| 7. | A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy
|
|
| Shiang-Feng Tzeng, Cheng-Chi Lee, and Tzu-Chun Lin, Vol. 12, No. 3, 2011, pp. 178-180 Article Full Text PDF |
||
| 8. | Subject index to volume 12 (2011)
|
|
| Article Full Text PDF | ||
| 9. | Author index to volume 12 (2011)
|
|
| Article Full Text PDF | ||
| 10. | Reviewer index to volume 12 (2011)
|
|
| Article Full Text PDF | ||