Quick Search:

Volume: 15, No: 3 (May 1, 2013)

International Journal of Network Security

1. Secure and Energy-efficient Geocast Protocol for Wireless Sensor Networks based on a Hierarchical Clustered Structure
Sébastien Faye and Jean Frédéric Myoupo, Vol. 15, No. 3, 2013, pp. 151-160
Article Full Text PDF

2. An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext
Qinyi Li, Hu Xiong, Fengli Zhang, and Shengke Zeng, Vol. 15, No. 3, 2013, pp. 161-170
Article Full Text PDF

3. Combating Good Point Set Scanning-based Self-learning Worms by Using Predators
Fangwei Wang, Yunkai Zhang, Honggang Guo, and Changguang Wang, Vol. 15, No. 3, 2013, pp. 171-178
Article Full Text PDF

4. Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party Setting
Jeng-Ping Lin, Jih-Ming Fu, Vol. 15, No. 3, 2013, pp. 179-189
Article Full Text PDF

5. Using Artificial Immune System and Fuzzy Logic for Alert Correlation
Mehdi Bateni, Ahmad Baraani, and Ali Akbar Ghorbani, Vol. 15, No. 3, 2013, pp. 190-204
Article Full Text PDF

6. On the Algorithms Related to Threshold Cryptography Based Network Protocols
Qi Duan and Mohit Virendra, Vol. 15, No. 3, 2013, pp. 205-211
Article Full Text PDF

7. An Efficient Oblivious Transfer Protocol Using Residue Number System
Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang, Vol. 15, No. 3, 2013, pp. 212-218
Article Full Text PDF

8. First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off
Monjur Alam, Santosh Ghosh, Dipanwita Roy Choudhury, and Indranil Sengupta, Vol. 15, No. 3, 2013, pp. 219-230
Article Full Text PDF