Quick Search:

Volume: 15, No: 2 (March 1, 2013)

International Journal of Network Security

1. A Study of Public Key Encryption with Keyword Search
Shih-Ting Hsu, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 15, No. 2, 2013, pp. 71-79
Article Full Text PDF

2. Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol
Heba Kamal Aslan and Ghada Farouk Elkabbany, Vol. 15, No. 2, 2013, pp. 80-96
Article Full Text PDF

3. Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents
Mueen Uddin, Azizah Abdul Rehman, Naeem Uddin, Jamshed Memon, Raed Alsaqour, and Suhail Kazi, Vol. 15, No. 2, 2013, pp. 97-105
Article Full Text PDF

4. A New Approach for Secure Data Transfer based on Wavelet Transform
G. Manikandan, M. Kamarasan, and N. Sairam, Vol. 15, No. 2, 2013, pp. 106-112
Article Full Text PDF

5. Sensitive Digital Image Watermarking for Copyright Protection
B. Surekha and G. N. Swamy, Vol. 15, No. 2, 2013, pp. 113-121
Article Full Text PDF

6. A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks
Changsha Ma, Kaiping Xue, and Peilin Hong, Vol. 15, No. 2, 2013, pp. 122-132
Article Full Text PDF

7. Public Key Replacement and Universal Forgery of a SCLS Scheme
Mingwu Zhang, Jintao Yao, Chunzhi Wang, and Tsuyoshi Takagi, Vol. 15, No. 2, 2013, pp. 133-138
Article Full Text PDF

8. A Smart Card-based Authentication Scheme Using User Identify Cryptography
Chin-Chen Chang and Chia-Yin Lee, Vol. 15, No. 2, 2013, pp. 139-147
Article Full Text PDF

9. Remarks on Zhang et al.'s Analysis on a Short Signature Scheme and Their Improvement
Kitae Kim, Hyungdon Kim, Seungho Kim, and Ikkwon Yie, Vol. 15, No. 2, 2013, pp. 148-150
Article Full Text PDF