International Journal of Network Security | ||
1. | Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks
|
|
Ashok Kumar Das, Vol. 14, No. 1, 2012, pp. 1-21 Article Full Text PDF |
||
2. | A Novel Secure Self Proxy Signature Scheme
|
|
Samaneh Mashhadi, Vol. 14, No. 1, 2012, pp. 22-26 Article Full Text PDF |
||
3. | A New Non Linear Model Based Encryption Mechanism with Time Stamp and Acknowledgement Support
|
|
Addepalli V. N. Krishna, Vol. 14, No. 1, 2012, pp. 27-32 Article Full Text PDF |
||
4. | Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues
|
|
Zhiwei Wang, Licheng Wang, Shihui Zheng, Yixian Yang, and Zhengming Hu, Vol. 14, No. 1, 2012, pp. 33-38 Article Full Text PDF |
||
5. | An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol
|
|
Sandeep Kumar Sood, Vol. 14, No. 1, 2012, pp. 39-46 Article Full Text PDF |
||
6. | Efficient Countermeasure for Securing the Eta Pairing Computation over Binary Fields
|
|
Mustapha Hedabou , Vol. 14, No. 1, 2012, pp. 47-52 Article Full Text PDF |
||
7. | Comments on a Buyer-Seller Watermarking Protocol for Large Scale Networks
|
|
Shuhua Wu and Qiong Pu, Vol. 14, No. 1, 2012, pp. 53-58 Article Full Text PDF |
||
8. | A Note on Security Protocol for Multicast Communications
|
|
Martin Stanek, Vol. 14, No. 1, 2012, pp. 59-60 Article Full Text PDF |
||