Quick Search:

Volume: 14, No: 2 (March 1, 2012)

International Journal of Network Security

1. ANN Based Scheme to Predict Number of Zombies in a DDoS Attack
Brij Bhooshan Gupta, Ramesh Chand Joshi, and Manoj Misra, Vol. 14, No. 2, 2012, pp. 61-70
Article Full Text PDF

2. Adaptively Secure Broadcast Encryption with Short Ciphertexts
Behzad Malek and Ali Miri, Vol. 14, No. 2, 2012, pp. 71-79
Article Full Text PDF

3. Weak Keys in RSA over The Work of Blomer & May
Navaneet Ojha and Sahdeo Padhye, Vol. 14, No. 2, 2012, pp. 80-85
Article Full Text PDF

4. Private Entity Authentication for Pervasive Computing Environments
Frank Zhu, Matt W. Matka, and Lionel M. Ni, Vol. 14, No. 2, 2012, pp. 86-100
Article Full Text PDF

5. A New Parallel Window-Based Implementation of the Elliptic Curve Point Multiplication in Multi-Core Architectures
Saikat Basu, Vol. 14, No. 2, 2012, pp. 101-108
Article Full Text PDF

6. A Network Covert Channel Based on Packet Classification
Ping Dong, Huanyan Qian, Zhongjun Lu, and Shaohua Lan, Vol. 14, No. 2, 2012, pp. 109-116
Article Full Text PDF

7. Cryptanalysis of a Non-interactive Deniable Authentication Protocol Based on Factoring
Razi Arshad and Nassar Ikram, Vol. 14, No. 2, 2012, pp. 117-120
Article Full Text PDF