International Journal of Network Security | ||
1. | Authentication vs. Privacy within Vehicular Ad Hoc Networks
|
|
Mohamed Salah Bouassida, Vol. 13, No. 3, 2011, pp. 121-134 Article Full Text PDF |
||
2. | The Efficient Dual Receiver Cryptosystem and Its Applications
|
|
Ted Diament, Homin K. Lee, Angelos D. Keromytis, and Moti Yung, Vol. 13, No. 3, 2011, pp. 135-151 Article Full Text PDF |
||
3. | Statistical Segregation Method to Minimize the False Detections During DDoS Attacks
|
|
J. Udhayan and T. Hamsapriya, Vol. 13, No. 3, 2011, pp. 152-160 Article Full Text PDF |
||
4. | A New Type of ID-based Encryption System and Its Application to Pay-TV Systems
|
|
Xingwen Zhao and Fangguo Zhang, Vol. 13, No. 3, 2011, pp. 161-166 Article Full Text PDF |
||
5. | An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks
|
|
Manoj Kumar, Mridul Kumar Gupta, and Saru kumari, Vol. 13, No. 3, 2011, pp. 167-177 Article Full Text PDF |
||
6. | Analysis on Hu et al.'s Identity-based Broadcast Encryption
|
|
Xingwen Zhao and Fangguo Zhang, Vol. 13, No. 3, 2011, pp. 178-180 Article Full Text PDF |
||
7. | Subject index to volume 13 (2011)
|
|
Article Full Text PDF | ||
8. | Author index to volume 13 (2011)
|
|
Article Full Text PDF | ||
9. | Reviewer index to volume 13 (2011)
|
|
Article Full Text PDF | ||
10. | All Papers to volume 13 (2011)
|
|
Article Full Text PDF | ||