Quick Search:

Volume: 12, No: 3 (May 1, 2011)

International Journal of Network Security

1. Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
Hussein Al-Bahadili, Shakir M. Hussain, Ghassan Issa, and Khaled El-Zayyat, Vol. 12, No. 3, 2011, pp. 121-129
Article Full Text PDF

2. Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings
Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, and Tsuyoshi Takagi, Vol. 12, No. 3, 2011, pp. 130-136
Article Full Text PDF

3. Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
S. V. Sathyanarayana, M. Aswatha Kumar, and K. N. Hari Bhat, Vol. 12, No. 3, 2011, pp. 137-150
Article Full Text PDF

4. Elliptic Curve Cryptosystems and Side-channel Attacks
Ekambaram Kesavulu Reddy, Vol. 12, No. 3, 2011, pp. 151-158
Article Full Text PDF

5. An Authentication Protocol Based on Kerberos 5
Eman El-Emam, Magdy Koutb, Hamdy Kelash, and Osama S. Faragallah, Vol. 12, No. 3, 2011, pp. 159-170
Article Full Text PDF

6. An Anonymous Auction Protocol Based on GDH Assumption
Fuw-Yi Yang and Cai-Ming Liao, Vol. 12, No. 3, 2011, pp. 171-177
Article Full Text PDF

7. A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy
Shiang-Feng Tzeng, Cheng-Chi Lee, and Tzu-Chun Lin, Vol. 12, No. 3, 2011, pp. 178-180
Article Full Text PDF

8. Subject index to volume 12 (2011)
Article Full Text PDF

9. Author index to volume 12 (2011)
Article Full Text PDF

10. Reviewer index to volume 12 (2011)
Article Full Text PDF