Quick Search:

Volume: 16, No: 2 (March 1, 2014)

International Journal of Network Security

1. A Survey of Botnet Architecture and Batnet Detection Techniques
Cheng-Yi Liu, Chih-Hsiang Peng, and Iuon-Chang Lin, Vol. 16, No. 2, 2014, pp. 81-89
Article Full Text PDF

2. Using Predicate-based Model Checker for Verifying E-Commerce Protocols
Tarek M. El-Sakka and M. Zaki, Vol. 16, No. 2, 2014, pp. 90-101
Article Full Text PDF

3. Trust-based Multi-Path Routing for Enhancing Data Security in MANETs
Poonam Gera, Kumkum Garg, and Manoj Misra, Vol. 16, No. 2, 2014, pp. 102-111
Article Full Text PDF

4. Cryptanalysis of NTRU with two Public Keys
Abderrahmane Nitaj, Vol. 16, No. 2, 2014, pp. 112-117
Article Full Text PDF

5. On the Design of RNS Bases for Modular Multiplication
Mohammad Esmaeildoust, Keivan Navi, Shirin Rezaei, Marzieh Gerami, Vol. 16, No. 2, 2014, pp. 118-128
Article Full Text PDF

6. One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity
Yuan Wang, Duncan S. Wong and Liusheng Huang, Vol. 16, No. 2, 2014, pp. 129-142
Article Full Text PDF

7. Notes on “Polynomial-Based Key Management for Secure Intra-Group and Inter-Group Communication”
Chin-Chen Chang, Lein Harn, and Ting-Fang Cheng, Vol. 16, No. 2, 2014, pp. 143-148
Article Full Text PDF

8. Efficient and Secured Ant Routing Algorithm for Wireless Sensor Networks
Benamar Kadri, Mohammed Feham, and Abdellah Mhammed, Vol. 16, No. 2, 2014, pp. 149-156
Article Full Text PDF

9. An Efficient MQV Key Agreement Scheme
Li-Chin Hwang and Min-Shiang Hwang, Vol. 16, No. 2, 2014, pp. 157-160
Article Full Text PDF