International Journal of Network Security | ||
1. | Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
|
|
Hussein Al-Bahadili, Shakir M. Hussain, Ghassan Issa, and Khaled El-Zayyat, Vol. 12, No. 3, 2011, pp. 121-129 Article Full Text PDF |
||
2. | Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings
|
|
Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, and Tsuyoshi Takagi, Vol. 12, No. 3, 2011, pp. 130-136 Article Full Text PDF |
||
3. | Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
|
|
S. V. Sathyanarayana, M. Aswatha Kumar, and K. N. Hari Bhat, Vol. 12, No. 3, 2011, pp. 137-150 Article Full Text PDF |
||
4. | Elliptic Curve Cryptosystems and Side-channel Attacks
|
|
Ekambaram Kesavulu Reddy, Vol. 12, No. 3, 2011, pp. 151-158 Article Full Text PDF |
||
5. | An Authentication Protocol Based on Kerberos 5
|
|
Eman El-Emam, Magdy Koutb, Hamdy Kelash, and Osama S. Faragallah, Vol. 12, No. 3, 2011, pp. 159-170 Article Full Text PDF |
||
6. | An Anonymous Auction Protocol Based on GDH Assumption
|
|
Fuw-Yi Yang and Cai-Ming Liao, Vol. 12, No. 3, 2011, pp. 171-177 Article Full Text PDF |
||
7. | A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy
|
|
Shiang-Feng Tzeng, Cheng-Chi Lee, and Tzu-Chun Lin, Vol. 12, No. 3, 2011, pp. 178-180 Article Full Text PDF |
||
8. | Subject index to volume 12 (2011)
|
|
Article Full Text PDF | ||
9. | Author index to volume 12 (2011)
|
|
Article Full Text PDF | ||
10. | Reviewer index to volume 12 (2011)
|
|
Article Full Text PDF | ||