International Journal of Network Security | ||
1. | Trustworthy TCB for DNS Servers
|
|
Arun Velagapalli and Mahalingam Ramkumar, Vol. 14, No. 4, 2012, pp. 187-205 Article Full Text PDF |
||
2. | Securing Harari's Authentication Scheme
|
|
Behzad Malek and Ali Miri, Vol. 14, No. 4, 2012, pp. 206-210 Article Full Text PDF |
||
3. | Parallel Misuse and Anomaly Detection Model
|
|
Radhika Goel, Anjali Sardana, and Ramesh C. Joshi, Vol. 14, No. 4, 2012, pp. 211-222 Article Full Text PDF |
||
4. | A Novel DWT Based Blind Watermarking for Image Authentication
|
|
S. S. Sujatha and M. Mohamed Sathik, Vol. 14, No. 4, 2012, pp. 223-228 Article Full Text PDF |
||
5. | Securing Bluetooth Communications
|
|
Tzu-Chang Yeh, Jian-Ren Peng, Sheng-Shih Wang, and Jun-Ping Hsu, Vol. 14, No. 4, 2012, pp. 229-235 Article Full Text PDF |
||
6. | Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications
|
|
S. Maria Celestin Vigila and K. Muneeswaran, Vol. 14, No. 4, 2012, pp. 236-242 Article Full Text PDF |
||