Quick Search:

Volume: 16, No: 2 (March 1, 2014)

International Journal of Network Security

1. A Survey of Botnet Architecture and Batnet Detection Techniques
Cheng-Yi Liu, Chih-Hsiang Peng, and Iuon-Chang Lin, Vol. 16, No. 2, 2014, pp. 81-89
Article Full Text PDF

2. Using Predicate-based Model Checker for Verifying E-Commerce Protocols
Tarek M. El-Sakka and M. Zaki, Vol. 16, No. 2, 2014, pp. 90-101
Article Full Text PDF

3. Trust-based Multi-Path Routing for Enhancing Data Security in MANETs
Poonam Gera, Kumkum Garg, and Manoj Misra, Vol. 16, No. 2, 2014, pp. 102-111
Article Full Text PDF

4. Cryptanalysis of NTRU with two Public Keys
Abderrahmane Nitaj, Vol. 16, No. 2, 2014, pp. 112-117
Article Full Text PDF

5. On the Design of RNS Bases for Modular Multiplication
Mohammad Esmaeildoust, Keivan Navi, Shirin Rezaei, Marzieh Gerami, Vol. 16, No. 2, 2014, pp. 118-128
Article Full Text PDF

6. One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity
Yuan Wang, Duncan S. Wong and Liusheng Huang, Vol. 16, No. 2, 2014, pp. 129-142
Article Full Text PDF

7. Notes on ‚ÄúPolynomial-Based Key Management for Secure Intra-Group and Inter-Group Communication‚ÄĚ
Chin-Chen Chang, Lein Harn, and Ting-Fang Cheng, Vol. 16, No. 2, 2014, pp. 143-148
Article Full Text PDF

8. Efficient and Secured Ant Routing Algorithm for Wireless Sensor Networks
Benamar Kadri, Mohammed Feham, and Abdellah Mhammed, Vol. 16, No. 2, 2014, pp. 149-156
Article Full Text PDF

9. An Efficient MQV Key Agreement Scheme
Li-Chin Hwang and Min-Shiang Hwang, Vol. 16, No. 2, 2014, pp. 157-160
Article Full Text PDF

10. Subject index to volume 16 (2014)
Article Full Text PDF

11. Author index to volume 16 (2014)
Article Full Text PDF

12. Reviewer index to volume 16 (2014)
Article Full Text PDF