International Journal of Network Security | ||
1. | Batch Verification and Finding Invalid Signatures in a Group Signature Scheme
|
|
Kitae Kim, Ikkwon Yie, Seongan Lim, and Daehun Nyang, Vol. 13, No. 2, 2011, pp. 61-70 Article Full Text PDF |
||
2. | ATCS: A Novel Anonymous and Traceable Communication Scheme for Vehicular Ad Hoc Networks
|
|
Wei Hu, Kaiping Xue, Peilin Hong, and Chuchu Wu, Vol. 13, No. 2, 2011, pp. 71-78 Article Full Text PDF |
||
3. | PGP Modification for Securing Digital Envelope Mail Using COM+ and Web Services
|
|
Tarek Salah Sobh and Mohamed Ibrahiem Amer, Vol. 13, No. 2, 2011, pp. 79-91 Article Full Text PDF |
||
4. | An Interval-based Contributory Key Agreement
|
|
Marimuthu Rajaram and Thilagavathy Dorairaj Suresh, Vol. 13, No. 2, 2011, pp. 92-97 Article Full Text PDF |
||
5. | Inverse Cookie-based Virtual Password Authentication Protocol
|
|
Sandeep Kumar Sood, Anil K. Sarje, and Kuldip Singh, Vol. 13, No. 2, 2011, pp. 98-108 Article Full Text PDF |
||
6. | Secure Routing for Wireless Mesh Networks
|
|
Celia Li, Zhuang Wang, and Cungang Yang, Vol. 13, No. 2, 2011, pp. 109-120 Article Full Text PDF |
||
7. | Subject index to volume 13 (2011)
|
|
Article Full Text PDF | ||
8. | Author index to volume 13 (2011)
|
|
Article Full Text PDF | ||
9. | Reviewer index to volume 13 (2011)
|
|
Article Full Text PDF | ||