International Journal of Network Security | ||
1. | Grid-based Data Stream Clustering for Intrusion Detection
|
|
Qian Quan, Chao-Jie Xiao, and Rui Zhang, Vol. 15, No. 1, 2013, pp. 1-8 Article Full Text PDF |
||
2. | Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices
|
|
Kakali Chatterjee, Asok De, and Daya Gupta, Vol. 15, No. 1, 2013, pp. 9-15 Article Full Text PDF |
||
3. | Relative Network Entropy based Clustering Algorithm for Intrusion Detection
|
|
Quan Qian, Tianhong Wang, and Rui Zhan, Vol. 15, No. 1, 2013, pp. 16-22 Article Full Text PDF |
||
4. | A New Modular Multiplication Method in Public Key Cryptosystem
|
|
G. A. V. Rama Chandra Rao, P. V. Lakshmi, and N. Ravi Shankar, Vol. 15, No. 1, 2013, pp. 23-27 Article Full Text PDF |
||
5. | DSP Re-encryption Based Access Control Enforcement Management Mechanism in DaaS
|
|
Xiuxia Tian, Xiaoling Wang, and Aoying Zhou, Vol. 15, No. 1, 2013, pp. 28-41 Article Full Text PDF |
||
6. | A PKI over Ant Colony based Routing Algorithms for MANETs –AntPKI–
|
|
Benamar Kadri, Djilalli Moussaoui, and Mohammed Feham, Vol. 15, No. 1, 2013, pp. 42-49 Article Full Text PDF |
||
7. | A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks
|
|
Mehran Asadi, Christopher Zimmerman, and Afrand Agah, Vol. 15, No. 1, 2013, pp. 50-58 Article Full Text PDF |
||
8. | An Algorithm for Computing m-Tight Error Linear Complexity of Sequences over GF(p^m) with Period p^m
|
|
Jianqin Zhou and Wei Xiong, Vol. 15, No. 1, 2013, pp. 59-63 Article Full Text PDF |
||
9. | Guessing Attacks on Strong-Password Authentication Protocol
|
|
Cheng-Chi Lee, Chia-Hsin Liu, and Min-Shiang Hwang, Vol. 15, No. 1, 2013, pp. 64-67 Article Full Text PDF |
||
10. | Cryptanalysis of a Polynomial-based Key Management Scheme for Secure Group Communication
|
|
Abdel Alim Kamal, Vol. 15, No. 1, 2013, pp. 68-70 Article Full Text PDF |
||