International Journal of Network Security | ||
1. | Privacy Protection Data Access Control
|
|
Min-Yu Chen, Chou-Chen Yang, and Min-Shiang Hwang, Vol. 15, No. 6, 2013, pp. 411-419 Article Full Text PDF |
||
2. | A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX
|
|
Günther Lackner, Vol. 15, No. 6, 2013, pp. 420-436 Article Full Text PDF |
||
3. | MAYHAM - A New Hash Function
|
|
Naila Shakeel, Ghulam Murtaza, and Nassar Ikram, Vol. 15, No. 6, 2013, pp. 437-445 Article Full Text PDF |
||
4. | A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance
|
|
Hongbin Tang, Xinsong Liu, Lei Jiang, Vol. 15, No. 6, 2013, pp. 446-454 Article Full Text PDF |
||
5. | Cryptosystem for Secret Sharing Scheme with Hierarchical Groups
|
|
Atanu Basu, Indranil Sengupta, and Jamuna Kanta Sing, Vol. 15, No. 6, 2013, pp. 455-464 Article Full Text PDF |
||
6. | Design of an Intelligent SHA-1 Based Cryptographic System: A CPSO Based Approach
|
|
Monjur Alam and Sonai Ray, Vol. 15, No. 6, 2013, pp. 465-470 Article Full Text PDF |
||
7. | A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies
|
|
Chin-Chen Chang and Jen-Ho Yang, Vol. 15, No. 6, 2013, pp. 471-477 Article Full Text PDF |
||
8. | Secure Requirement Prioritized Grid Scheduling Model
|
|
Manjot Kaur Bhatia1, S. K. Muttoo, and M. P. S. Bhatia, Vol. 15, No. 6, 2013, pp. 478-483 Article Full Text PDF |
||
9. | A Practical Identity-based Signcryption Scheme
|
|
Huiyan Chen, Yong Li, and Jinping Ren, Vol. 15, No. 6, 2013, pp. 484-489 Article Full Text PDF |
||
10. | A Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks
|
|
Neeraj Kumar, Manoj Kumar, R. B. Patel, Vol. 15, No. 6, 2013, pp. 490-500 Article Full Text PDF |
||
11. | Reviewer index to volume 15 (2013)
|
|
Article Full Text PDF | ||