International Journal of Network Security | ||
1. | ANN Based Scheme to Predict Number of Zombies in a DDoS Attack
|
|
Brij Bhooshan Gupta, Ramesh Chand Joshi, and Manoj Misra, Vol. 14, No. 2, 2012, pp. 61-70 Article Full Text PDF |
||
2. | Adaptively Secure Broadcast Encryption with Short Ciphertexts
|
|
Behzad Malek and Ali Miri, Vol. 14, No. 2, 2012, pp. 71-79 Article Full Text PDF |
||
3. | Weak Keys in RSA over The Work of Blomer & May
|
|
Navaneet Ojha and Sahdeo Padhye, Vol. 14, No. 2, 2012, pp. 80-85 Article Full Text PDF |
||
4. | Private Entity Authentication for Pervasive Computing Environments
|
|
Frank Zhu, Matt W. Matka, and Lionel M. Ni, Vol. 14, No. 2, 2012, pp. 86-100 Article Full Text PDF |
||
5. | A New Parallel Window-Based Implementation of the Elliptic Curve Point Multiplication in Multi-Core Architectures
|
|
Saikat Basu, Vol. 14, No. 2, 2012, pp. 101-108 Article Full Text PDF |
||
6. | A Network Covert Channel Based on Packet Classification
|
|
Ping Dong, Huanyan Qian, Zhongjun Lu, and Shaohua Lan, Vol. 14, No. 2, 2012, pp. 109-116 Article Full Text PDF |
||
7. | Cryptanalysis of a Non-interactive Deniable Authentication Protocol Based on Factoring
|
|
Razi Arshad and Nassar Ikram, Vol. 14, No. 2, 2012, pp. 117-120 Article Full Text PDF |
||