Quick Search:

Volume: 14, No: 2 (March 1, 2012)

International Journal of Network Security

1. ANN Based Scheme to Predict Number of Zombies in a DDoS Attack
Brij Bhooshan Gupta, Ramesh Chand Joshi, and Manoj Misra, Vol. 14, No. 2, 2012, pp. 61-70
Article Full Text PDF

2. Adaptively Secure Broadcast Encryption with Short Ciphertexts
Behzad Malek and Ali Miri, Vol. 14, No. 2, 2012, pp. 71-79
Article Full Text PDF

3. Weak Keys in RSA over The Work of Blomer & May
Navaneet Ojha and Sahdeo Padhye, Vol. 14, No. 2, 2012, pp. 80-85
Article Full Text PDF

4. Private Entity Authentication for Pervasive Computing Environments
Frank Zhu, Matt W. Matka, and Lionel M. Ni, Vol. 14, No. 2, 2012, pp. 86-100
Article Full Text PDF

5. A New Parallel Window-Based Implementation of the Elliptic Curve Point Multiplication in Multi-Core Architectures
Saikat Basu, Vol. 14, No. 2, 2012, pp. 101-108
Article Full Text PDF

6. A Network Covert Channel Based on Packet Classification
Ping Dong, Huanyan Qian, Zhongjun Lu, and Shaohua Lan, Vol. 14, No. 2, 2012, pp. 109-116
Article Full Text PDF

7. Cryptanalysis of a Non-interactive Deniable Authentication Protocol Based on Factoring
Razi Arshad and Nassar Ikram, Vol. 14, No. 2, 2012, pp. 117-120
Article Full Text PDF

8. Subject index to volume 14 (2012)
Article Full Text PDF

9. Author index to volume 14 (2012)
Article Full Text PDF

10. Reviewer index to volume 14 (2012)
Article Full Text PDF