Quick Search:

Volume: 15, No: 6 (November 1, 2013)

International Journal of Network Security

1. Privacy Protection Data Access Control
Min-Yu Chen, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 15, No. 6, 2013, pp. 411-419
Article Full Text PDF

2. A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX
G√ľnther Lackner, Vol. 15, No. 6, 2013, pp. 420-436
Article Full Text PDF

3. MAYHAM - A New Hash Function
Naila Shakeel, Ghulam Murtaza, and Nassar Ikram, Vol. 15, No. 6, 2013, pp. 437-445
Article Full Text PDF

4. A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance
Hongbin Tang, Xinsong Liu, Lei Jiang, Vol. 15, No. 6, 2013, pp. 446-454
Article Full Text PDF

5. Cryptosystem for Secret Sharing Scheme with Hierarchical Groups
Atanu Basu, Indranil Sengupta, and Jamuna Kanta Sing, Vol. 15, No. 6, 2013, pp. 455-464
Article Full Text PDF

6. Design of an Intelligent SHA-1 Based Cryptographic System: A CPSO Based Approach
Monjur Alam and Sonai Ray, Vol. 15, No. 6, 2013, pp. 465-470
Article Full Text PDF

7. A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies
Chin-Chen Chang and Jen-Ho Yang, Vol. 15, No. 6, 2013, pp. 471-477
Article Full Text PDF

8. Secure Requirement Prioritized Grid Scheduling Model
Manjot Kaur Bhatia1, S. K. Muttoo, and M. P. S. Bhatia, Vol. 15, No. 6, 2013, pp. 478-483
Article Full Text PDF

9. A Practical Identity-based Signcryption Scheme
Huiyan Chen, Yong Li, and Jinping Ren, Vol. 15, No. 6, 2013, pp. 484-489
Article Full Text PDF

10. A Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks
Neeraj Kumar, Manoj Kumar, R. B. Patel, Vol. 15, No. 6, 2013, pp. 490-500
Article Full Text PDF

11. Reviewer index to volume 15 (2013)
Article Full Text PDF