Quick Search:

Volume: 14, No: 5 (September 1, 2012)

International Journal of Network Security

1. Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems
I-Wei Chen, Po-Ching Lin, Tsung-Huan Cheng, Chi-Chung Luo, Ying-Dar Lin, Yuan-Cheng Lai, Frank C. Lin, Vol. 14, No. 5, 2012, pp. 243-250
Article Full Text PDF

2. Amendment to Trace and Revoke Systems with Short Ciphertexts
Xingwen Zhao, Vol. 14, No. 5, 2012, pp. 251-256
Article Full Text PDF

3. An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks
N. Jeyanthi and N. Ch. Sriman Narayana Iyengar, Vol. 14, No. 5, 2012, pp. 257-269
Article Full Text PDF

4. Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy
Zhenhua Chen, Shundong Li, Chunzhi Wang, and Yanping Shen, Vol. 14, No. 5, 2012, pp. 270-279
Article Full Text PDF

5. Query Processing Performance on Encrypted Databases by Using the REA Algorithm
Ayman Mousa, Elsayed Nigm, Sayed El-Rabaie, Osama Faragallah, Vol. 14, No. 5, 2012, pp. 280-288
Article Full Text PDF

6. Evaluation of Encryption Algorithms for Privacy Preserving Association Rules Mining
Ashraf B. El-Sisi and Hamdy M. Mousa, Vol. 14, No. 5, 2012, pp. 289-296
Article Full Text PDF

7. Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications
Jianbin Hu, Hu Xiong, and Zhong Chen, Vol. 14, No. 5, 2012, pp. 297-300
Article Full Text PDF