Quick Search:

Volume: 14, No: 4 (July 1, 2012)

International Journal of Network Security

1. Trustworthy TCB for DNS Servers
Arun Velagapalli and Mahalingam Ramkumar, Vol. 14, No. 4, 2012, pp. 187-205
Article Full Text PDF

2. Securing Harari's Authentication Scheme
Behzad Malek and Ali Miri, Vol. 14, No. 4, 2012, pp. 206-210
Article Full Text PDF

3. Parallel Misuse and Anomaly Detection Model
Radhika Goel, Anjali Sardana, and Ramesh C. Joshi, Vol. 14, No. 4, 2012, pp. 211-222
Article Full Text PDF

4. A Novel DWT Based Blind Watermarking for Image Authentication
S. S. Sujatha and M. Mohamed Sathik, Vol. 14, No. 4, 2012, pp. 223-228
Article Full Text PDF

5. Securing Bluetooth Communications
Tzu-Chang Yeh, Jian-Ren Peng, Sheng-Shih Wang, and Jun-Ping Hsu, Vol. 14, No. 4, 2012, pp. 229-235
Article Full Text PDF

6. Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications
S. Maria Celestin Vigila and K. Muneeswaran, Vol. 14, No. 4, 2012, pp. 236-242
Article Full Text PDF