International Journal of Network Security | ||
1. | Secure and Energy-efficient Geocast Protocol for Wireless Sensor Networks based on a Hierarchical Clustered Structure
|
|
Sébastien Faye and Jean Frédéric Myoupo, Vol. 15, No. 3, 2013, pp. 151-160 Article Full Text PDF |
||
2. | An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext
|
|
Qinyi Li, Hu Xiong, Fengli Zhang, and Shengke Zeng, Vol. 15, No. 3, 2013, pp. 161-170 Article Full Text PDF |
||
3. | Combating Good Point Set Scanning-based Self-learning Worms by Using Predators
|
|
Fangwei Wang, Yunkai Zhang, Honggang Guo, and Changguang Wang, Vol. 15, No. 3, 2013, pp. 171-178 Article Full Text PDF |
||
4. | Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party Setting
|
|
Jeng-Ping Lin, Jih-Ming Fu, Vol. 15, No. 3, 2013, pp. 179-189 Article Full Text PDF |
||
5. | Using Artificial Immune System and Fuzzy Logic for Alert Correlation
|
|
Mehdi Bateni, Ahmad Baraani, and Ali Akbar Ghorbani, Vol. 15, No. 3, 2013, pp. 190-204 Article Full Text PDF |
||
6. | On the Algorithms Related to Threshold Cryptography Based Network Protocols
|
|
Qi Duan and Mohit Virendra, Vol. 15, No. 3, 2013, pp. 205-211 Article Full Text PDF |
||
7. | An Efficient Oblivious Transfer Protocol Using Residue Number System
|
|
Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang, Vol. 15, No. 3, 2013, pp. 212-218 Article Full Text PDF |
||
8. | First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off
|
|
Monjur Alam, Santosh Ghosh, Dipanwita Roy Choudhury, and Indranil Sengupta, Vol. 15, No. 3, 2013, pp. 219-230 Article Full Text PDF |
||