International Journal of Network Security | ||
1. | A Study of Public Key Encryption with Keyword Search
|
|
Shih-Ting Hsu, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 15, No. 2, 2013, pp. 71-79 Article Full Text PDF |
||
2. | Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol
|
|
Heba Kamal Aslan and Ghada Farouk Elkabbany, Vol. 15, No. 2, 2013, pp. 80-96 Article Full Text PDF |
||
3. | Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents
|
|
Mueen Uddin, Azizah Abdul Rehman, Naeem Uddin, Jamshed Memon, Raed Alsaqour, and Suhail Kazi, Vol. 15, No. 2, 2013, pp. 97-105 Article Full Text PDF |
||
4. | A New Approach for Secure Data Transfer based on Wavelet Transform
|
|
G. Manikandan, M. Kamarasan, and N. Sairam, Vol. 15, No. 2, 2013, pp. 106-112 Article Full Text PDF |
||
5. | Sensitive Digital Image Watermarking for Copyright Protection
|
|
B. Surekha and G. N. Swamy, Vol. 15, No. 2, 2013, pp. 113-121 Article Full Text PDF |
||
6. | A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks
|
|
Changsha Ma, Kaiping Xue, and Peilin Hong, Vol. 15, No. 2, 2013, pp. 122-132 Article Full Text PDF |
||
7. | Public Key Replacement and Universal Forgery of a SCLS Scheme
|
|
Mingwu Zhang, Jintao Yao, Chunzhi Wang, and Tsuyoshi Takagi, Vol. 15, No. 2, 2013, pp. 133-138 Article Full Text PDF |
||
8. | A Smart Card-based Authentication Scheme Using User Identify Cryptography
|
|
Chin-Chen Chang and Chia-Yin Lee, Vol. 15, No. 2, 2013, pp. 139-147 Article Full Text PDF |
||
9. | Remarks on Zhang et al.'s Analysis on a Short Signature Scheme and Their Improvement
|
|
Kitae Kim, Hyungdon Kim, Seungho Kim, and Ikkwon Yie, Vol. 15, No. 2, 2013, pp. 148-150 Article Full Text PDF |
||