International Journal of Network Security | ||
1. | Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems
|
|
I-Wei Chen, Po-Ching Lin, Tsung-Huan Cheng, Chi-Chung Luo, Ying-Dar Lin, Yuan-Cheng Lai, Frank C. Lin, Vol. 14, No. 5, 2012, pp. 243-250 Article Full Text PDF |
||
2. | Amendment to Trace and Revoke Systems with Short Ciphertexts
|
|
Xingwen Zhao, Vol. 14, No. 5, 2012, pp. 251-256 Article Full Text PDF |
||
3. | An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks
|
|
N. Jeyanthi and N. Ch. Sriman Narayana Iyengar, Vol. 14, No. 5, 2012, pp. 257-269 Article Full Text PDF |
||
4. | Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy
|
|
Zhenhua Chen, Shundong Li, Chunzhi Wang, and Yanping Shen, Vol. 14, No. 5, 2012, pp. 270-279 Article Full Text PDF |
||
5. | Query Processing Performance on Encrypted Databases by Using the REA Algorithm
|
|
Ayman Mousa, Elsayed Nigm, Sayed El-Rabaie, Osama Faragallah, Vol. 14, No. 5, 2012, pp. 280-288 Article Full Text PDF |
||
6. | Evaluation of Encryption Algorithms for Privacy Preserving Association Rules Mining
|
|
Ashraf B. El-Sisi and Hamdy M. Mousa, Vol. 14, No. 5, 2012, pp. 289-296 Article Full Text PDF |
||
7. | Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications
|
|
Jianbin Hu, Hu Xiong, and Zhong Chen, Vol. 14, No. 5, 2012, pp. 297-300 Article Full Text PDF |
||