| International Journal of Network Security | ||
| 1. | A Study of Public Key Encryption with Keyword Search
|
|
| Shih-Ting Hsu, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 15, No. 2, 2013, pp. 71-79 Article Full Text PDF |
||
| 2. | Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol
|
|
| Heba Kamal Aslan and Ghada Farouk Elkabbany, Vol. 15, No. 2, 2013, pp. 80-96 Article Full Text PDF |
||
| 3. | Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents
|
|
| Mueen Uddin, Azizah Abdul Rehman, Naeem Uddin, Jamshed Memon, Raed Alsaqour, and Suhail Kazi, Vol. 15, No. 2, 2013, pp. 97-105 Article Full Text PDF |
||
| 4. | A New Approach for Secure Data Transfer based on Wavelet Transform
|
|
| G. Manikandan, M. Kamarasan, and N. Sairam, Vol. 15, No. 2, 2013, pp. 106-112 Article Full Text PDF |
||
| 5. | Sensitive Digital Image Watermarking for Copyright Protection
|
|
| B. Surekha and G. N. Swamy, Vol. 15, No. 2, 2013, pp. 113-121 Article Full Text PDF |
||
| 6. | A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks
|
|
| Changsha Ma, Kaiping Xue, and Peilin Hong, Vol. 15, No. 2, 2013, pp. 122-132 Article Full Text PDF |
||
| 7. | Public Key Replacement and Universal Forgery of a SCLS Scheme
|
|
| Mingwu Zhang, Jintao Yao, Chunzhi Wang, and Tsuyoshi Takagi, Vol. 15, No. 2, 2013, pp. 133-138 Article Full Text PDF |
||
| 8. | A Smart Card-based Authentication Scheme Using User Identify Cryptography
|
|
| Chin-Chen Chang and Chia-Yin Lee, Vol. 15, No. 2, 2013, pp. 139-147 Article Full Text PDF |
||
| 9. | Remarks on Zhang et al.'s Analysis on a Short Signature Scheme and Their Improvement
|
|
| Kitae Kim, Hyungdon Kim, Seungho Kim, and Ikkwon Yie, Vol. 15, No. 2, 2013, pp. 148-150 Article Full Text PDF |
||