Quick Search:

Volume: 15, No: 1 (January 1, 2013)

International Journal of Network Security

1. Grid-based Data Stream Clustering for Intrusion Detection
Qian Quan, Chao-Jie Xiao, and Rui Zhang, Vol. 15, No. 1, 2013, pp. 1-8
Article Full Text PDF

2. Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices
Kakali Chatterjee, Asok De, and Daya Gupta, Vol. 15, No. 1, 2013, pp. 9-15
Article Full Text PDF

3. Relative Network Entropy based Clustering Algorithm for Intrusion Detection
Quan Qian, Tianhong Wang, and Rui Zhan, Vol. 15, No. 1, 2013, pp. 16-22
Article Full Text PDF

4. A New Modular Multiplication Method in Public Key Cryptosystem
G. A. V. Rama Chandra Rao, P. V. Lakshmi, and N. Ravi Shankar, Vol. 15, No. 1, 2013, pp. 23-27
Article Full Text PDF

5. DSP Re-encryption Based Access Control Enforcement Management Mechanism in DaaS
Xiuxia Tian, Xiaoling Wang, and Aoying Zhou, Vol. 15, No. 1, 2013, pp. 28-41
Article Full Text PDF

6. A PKI over Ant Colony based Routing Algorithms for MANETs –AntPKI–
Benamar Kadri, Djilalli Moussaoui, and Mohammed Feham, Vol. 15, No. 1, 2013, pp. 42-49
Article Full Text PDF

7. A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks
Mehran Asadi, Christopher Zimmerman, and Afrand Agah, Vol. 15, No. 1, 2013, pp. 50-58
Article Full Text PDF

8. An Algorithm for Computing m-Tight Error Linear Complexity of Sequences over GF(p^m) with Period p^m
Jianqin Zhou and Wei Xiong, Vol. 15, No. 1, 2013, pp. 59-63
Article Full Text PDF

9. Guessing Attacks on Strong-Password Authentication Protocol
Cheng-Chi Lee, Chia-Hsin Liu, and Min-Shiang Hwang, Vol. 15, No. 1, 2013, pp. 64-67
Article Full Text PDF

10. Cryptanalysis of a Polynomial-based Key Management Scheme for Secure Group Communication
Abdel Alim Kamal, Vol. 15, No. 1, 2013, pp. 68-70
Article Full Text PDF