International Journal of Network Security  
1.  Gridbased Data Stream Clustering for Intrusion Detection


Qian Quan, ChaoJie Xiao, and Rui Zhang, Vol. 15, No. 1, 2013, pp. 18 Article Full Text PDF 

2.  Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices


Kakali Chatterjee, Asok De, and Daya Gupta, Vol. 15, No. 1, 2013, pp. 915 Article Full Text PDF 

3.  Relative Network Entropy based Clustering Algorithm for Intrusion Detection


Quan Qian, Tianhong Wang, and Rui Zhan, Vol. 15, No. 1, 2013, pp. 1622 Article Full Text PDF 

4.  A New Modular Multiplication Method in Public Key Cryptosystem


G. A. V. Rama Chandra Rao, P. V. Lakshmi, and N. Ravi Shankar, Vol. 15, No. 1, 2013, pp. 2327 Article Full Text PDF 

5.  DSP Reencryption Based Access Control Enforcement Management Mechanism in DaaS


Xiuxia Tian, Xiaoling Wang, and Aoying Zhou, Vol. 15, No. 1, 2013, pp. 2841 Article Full Text PDF 

6.  A PKI over Ant Colony based Routing Algorithms for MANETs –AntPKI–


Benamar Kadri, Djilalli Moussaoui, and Mohammed Feham, Vol. 15, No. 1, 2013, pp. 4249 Article Full Text PDF 

7.  A Gametheoretic Approach to Security and Power Conservation in Wireless Sensor Networks


Mehran Asadi, Christopher Zimmerman, and Afrand Agah, Vol. 15, No. 1, 2013, pp. 5058 Article Full Text PDF 

8.  An Algorithm for Computing mTight Error Linear Complexity of Sequences over GF(p^m) with Period p^m


Jianqin Zhou and Wei Xiong, Vol. 15, No. 1, 2013, pp. 5963 Article Full Text PDF 

9.  Guessing Attacks on StrongPassword Authentication Protocol


ChengChi Lee, ChiaHsin Liu, and MinShiang Hwang, Vol. 15, No. 1, 2013, pp. 6467 Article Full Text PDF 

10.  Cryptanalysis of a Polynomialbased Key Management Scheme for Secure Group Communication


Abdel Alim Kamal, Vol. 15, No. 1, 2013, pp. 6870 Article Full Text PDF 
