International Journal of Network Security | ||
1. | A Survey of Botnet Architecture and Batnet Detection Techniques
|
|
Cheng-Yi Liu, Chih-Hsiang Peng, and Iuon-Chang Lin, Vol. 16, No. 2, 2014, pp. 81-89 Article Full Text PDF |
||
2. | Using Predicate-based Model Checker for Verifying E-Commerce Protocols
|
|
Tarek M. El-Sakka and M. Zaki, Vol. 16, No. 2, 2014, pp. 90-101 Article Full Text PDF |
||
3. | Trust-based Multi-Path Routing for Enhancing Data Security in MANETs
|
|
Poonam Gera, Kumkum Garg, and Manoj Misra, Vol. 16, No. 2, 2014, pp. 102-111 Article Full Text PDF |
||
4. | Cryptanalysis of NTRU with two Public Keys
|
|
Abderrahmane Nitaj, Vol. 16, No. 2, 2014, pp. 112-117 Article Full Text PDF |
||
5. | On the Design of RNS Bases for Modular Multiplication
|
|
Mohammad Esmaeildoust, Keivan Navi, Shirin Rezaei, Marzieh Gerami, Vol. 16, No. 2, 2014, pp. 118-128 Article Full Text PDF |
||
6. | One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity
|
|
Yuan Wang, Duncan S. Wong and Liusheng Huang, Vol. 16, No. 2, 2014, pp. 129-142 Article Full Text PDF |
||
7. | Notes on “Polynomial-Based Key Management for Secure Intra-Group and Inter-Group Communication”
|
|
Chin-Chen Chang, Lein Harn, and Ting-Fang Cheng, Vol. 16, No. 2, 2014, pp. 143-148 Article Full Text PDF |
||
8. | Efficient and Secured Ant Routing Algorithm for Wireless Sensor Networks
|
|
Benamar Kadri, Mohammed Feham, and Abdellah Mhammed, Vol. 16, No. 2, 2014, pp. 149-156 Article Full Text PDF |
||
9. | An Efficient MQV Key Agreement Scheme
|
|
Li-Chin Hwang and Min-Shiang Hwang, Vol. 16, No. 2, 2014, pp. 157-160 Article Full Text PDF |
||