Quick Search:

Volume: 15, No: 6 (November 1, 2013)

International Journal of Network Security

1. Privacy Protection Data Access Control
Min-Yu Chen, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 15, No. 6, 2013, pp. 411-419
Article Full Text PDF

2. A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX
G√ľnther Lackner, Vol. 15, No. 6, 2013, pp. 420-436
Article Full Text PDF

3. MAYHAM - A New Hash Function
Naila Shakeel, Ghulam Murtaza, and Nassar Ikram, Vol. 15, No. 6, 2013, pp. 437-445
Article Full Text PDF

4. A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance
Hongbin Tang, Xinsong Liu, Lei Jiang, Vol. 15, No. 6, 2013, pp. 446-454
Article Full Text PDF

5. Cryptosystem for Secret Sharing Scheme with Hierarchical Groups
Atanu Basu, Indranil Sengupta, and Jamuna Kanta Sing, Vol. 15, No. 6, 2013, pp. 455-464
Article Full Text PDF

6. Design of an Intelligent SHA-1 Based Cryptographic System: A CPSO Based Approach
Monjur Alam and Sonai Ray, Vol. 15, No. 6, 2013, pp. 465-470
Article Full Text PDF

7. A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies
Chin-Chen Chang and Jen-Ho Yang, Vol. 15, No. 6, 2013, pp. 471-477
Article Full Text PDF

8. Secure Requirement Prioritized Grid Scheduling Model
Manjot Kaur Bhatia1, S. K. Muttoo, and M. P. S. Bhatia, Vol. 15, No. 6, 2013, pp. 478-483
Article Full Text PDF

9. A Practical Identity-based Signcryption Scheme
Huiyan Chen, Yong Li, and Jinping Ren, Vol. 15, No. 6, 2013, pp. 484-489
Article Full Text PDF

10. A Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks
Neeraj Kumar, Manoj Kumar, R. B. Patel, Vol. 15, No. 6, 2013, pp. 490-500
Article Full Text PDF

11. Subject index to volume 15 (2013)
Article Full Text PDF

12. Author index to volume 15 (2013)
Article Full Text PDF

13. Reviewer index to volume 15 (2013)
Article Full Text PDF