Quick Search:

Volume: 15, No: 2 (March 1, 2013)

International Journal of Network Security

1. A Study of Public Key Encryption with Keyword Search
Shih-Ting Hsu, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 15, No. 2, 2013, pp. 71-79
Article Full Text PDF

2. Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol
Heba Kamal Aslan and Ghada Farouk Elkabbany, Vol. 15, No. 2, 2013, pp. 80-96
Article Full Text PDF

3. Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents
Mueen Uddin, Azizah Abdul Rehman, Naeem Uddin, Jamshed Memon, Raed Alsaqour, and Suhail Kazi, Vol. 15, No. 2, 2013, pp. 97-105
Article Full Text PDF

4. A New Approach for Secure Data Transfer based on Wavelet Transform
G. Manikandan, M. Kamarasan, and N. Sairam, Vol. 15, No. 2, 2013, pp. 106-112
Article Full Text PDF

5. Sensitive Digital Image Watermarking for Copyright Protection
B. Surekha and G. N. Swamy, Vol. 15, No. 2, 2013, pp. 113-121
Article Full Text PDF

6. A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks
Changsha Ma, Kaiping Xue, and Peilin Hong, Vol. 15, No. 2, 2013, pp. 122-132
Article Full Text PDF

7. Public Key Replacement and Universal Forgery of a SCLS Scheme
Mingwu Zhang, Jintao Yao, Chunzhi Wang, and Tsuyoshi Takagi, Vol. 15, No. 2, 2013, pp. 133-138
Article Full Text PDF

8. A Smart Card-based Authentication Scheme Using User Identify Cryptography
Chin-Chen Chang and Chia-Yin Lee, Vol. 15, No. 2, 2013, pp. 139-147
Article Full Text PDF

9. Remarks on Zhang et al.'s Analysis on a Short Signature Scheme and Their Improvement
Kitae Kim, Hyungdon Kim, Seungho Kim, and Ikkwon Yie, Vol. 15, No. 2, 2013, pp. 148-150
Article Full Text PDF

10. Subject index to volume 15 (2013)
Article Full Text PDF

11. Author index to volume 15 (2013)
Article Full Text PDF

12. Reviewer index to volume 15 (2013)
Article Full Text PDF