| International Journal of Network Security | ||
| 1. | ANN Based Scheme to Predict Number of Zombies in a DDoS Attack
|
|
| Brij Bhooshan Gupta, Ramesh Chand Joshi, and Manoj Misra, Vol. 14, No. 2, 2012, pp. 61-70 Article Full Text PDF |
||
| 2. | Adaptively Secure Broadcast Encryption with Short Ciphertexts
|
|
| Behzad Malek and Ali Miri, Vol. 14, No. 2, 2012, pp. 71-79 Article Full Text PDF |
||
| 3. | Weak Keys in RSA over The Work of Blomer & May
|
|
| Navaneet Ojha and Sahdeo Padhye, Vol. 14, No. 2, 2012, pp. 80-85 Article Full Text PDF |
||
| 4. | Private Entity Authentication for Pervasive Computing Environments
|
|
| Frank Zhu, Matt W. Matka, and Lionel M. Ni, Vol. 14, No. 2, 2012, pp. 86-100 Article Full Text PDF |
||
| 5. | A New Parallel Window-Based Implementation of the Elliptic Curve Point Multiplication in Multi-Core Architectures
|
|
| Saikat Basu, Vol. 14, No. 2, 2012, pp. 101-108 Article Full Text PDF |
||
| 6. | A Network Covert Channel Based on Packet Classification
|
|
| Ping Dong, Huanyan Qian, Zhongjun Lu, and Shaohua Lan, Vol. 14, No. 2, 2012, pp. 109-116 Article Full Text PDF |
||
| 7. | Cryptanalysis of a Non-interactive Deniable Authentication Protocol Based on Factoring
|
|
| Razi Arshad and Nassar Ikram, Vol. 14, No. 2, 2012, pp. 117-120 Article Full Text PDF |
||