Quick Search:

Volume: 15, No: 1 (January 1, 2013)

International Journal of Network Security

1. Grid-based Data Stream Clustering for Intrusion Detection
Qian Quan, Chao-Jie Xiao, and Rui Zhang, Vol. 15, No. 1, 2013, pp. 1-8
Article Full Text PDF

2. Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices
Kakali Chatterjee, Asok De, and Daya Gupta, Vol. 15, No. 1, 2013, pp. 9-15
Article Full Text PDF

3. Relative Network Entropy based Clustering Algorithm for Intrusion Detection
Quan Qian, Tianhong Wang, and Rui Zhan, Vol. 15, No. 1, 2013, pp. 16-22
Article Full Text PDF

4. A New Modular Multiplication Method in Public Key Cryptosystem
G. A. V. Rama Chandra Rao, P. V. Lakshmi, and N. Ravi Shankar, Vol. 15, No. 1, 2013, pp. 23-27
Article Full Text PDF

5. DSP Re-encryption Based Access Control Enforcement Management Mechanism in DaaS
Xiuxia Tian, Xiaoling Wang, and Aoying Zhou, Vol. 15, No. 1, 2013, pp. 28-41
Article Full Text PDF

6. A PKI over Ant Colony based Routing Algorithms for MANETs –AntPKI–
Benamar Kadri, Djilalli Moussaoui, and Mohammed Feham, Vol. 15, No. 1, 2013, pp. 42-49
Article Full Text PDF

7. A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks
Mehran Asadi, Christopher Zimmerman, and Afrand Agah, Vol. 15, No. 1, 2013, pp. 50-58
Article Full Text PDF

8. An Algorithm for Computing m-Tight Error Linear Complexity of Sequences over GF(p^m) with Period p^m
Jianqin Zhou and Wei Xiong, Vol. 15, No. 1, 2013, pp. 59-63
Article Full Text PDF

9. Guessing Attacks on Strong-Password Authentication Protocol
Cheng-Chi Lee, Chia-Hsin Liu, and Min-Shiang Hwang, Vol. 15, No. 1, 2013, pp. 64-67
Article Full Text PDF

10. Cryptanalysis of a Polynomial-based Key Management Scheme for Secure Group Communication
Abdel Alim Kamal, Vol. 15, No. 1, 2013, pp. 68-70
Article Full Text PDF

11. Subject index to volume 15 (2013)
Article Full Text PDF

12. Author index to volume 15 (2013)
Article Full Text PDF

13. Reviewer index to volume 15 (2013)
Article Full Text PDF