Quick Search:

Volume: 14, No: 4 (July 1, 2012)

International Journal of Network Security

1. Trustworthy TCB for DNS Servers
Arun Velagapalli and Mahalingam Ramkumar, Vol. 14, No. 4, 2012, pp. 187-205
Article Full Text PDF

2. Securing Harari's Authentication Scheme
Behzad Malek and Ali Miri, Vol. 14, No. 4, 2012, pp. 206-210
Article Full Text PDF

3. Parallel Misuse and Anomaly Detection Model
Radhika Goel, Anjali Sardana, and Ramesh C. Joshi, Vol. 14, No. 4, 2012, pp. 211-222
Article Full Text PDF

4. A Novel DWT Based Blind Watermarking for Image Authentication
S. S. Sujatha and M. Mohamed Sathik, Vol. 14, No. 4, 2012, pp. 223-228
Article Full Text PDF

5. Securing Bluetooth Communications
Tzu-Chang Yeh, Jian-Ren Peng, Sheng-Shih Wang, and Jun-Ping Hsu, Vol. 14, No. 4, 2012, pp. 229-235
Article Full Text PDF

6. Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications
S. Maria Celestin Vigila and K. Muneeswaran, Vol. 14, No. 4, 2012, pp. 236-242
Article Full Text PDF

7. Subject index to volume 14 (2012)
Article Full Text PDF

8. Author index to volume 14 (2012)
Article Full Text PDF

9. Reviewer index to volume 14 (2012)
Article Full Text PDF