| International Journal of Network Security | ||
| 1. | A Survey of Botnet Architecture and Batnet Detection Techniques
|
|
| Cheng-Yi Liu, Chih-Hsiang Peng, and Iuon-Chang Lin, Vol. 16, No. 2, 2014, pp. 81-89 Article Full Text PDF |
||
| 2. | Using Predicate-based Model Checker for Verifying E-Commerce Protocols
|
|
| Tarek M. El-Sakka and M. Zaki, Vol. 16, No. 2, 2014, pp. 90-101 Article Full Text PDF |
||
| 3. | Trust-based Multi-Path Routing for Enhancing Data Security in MANETs
|
|
| Poonam Gera, Kumkum Garg, and Manoj Misra, Vol. 16, No. 2, 2014, pp. 102-111 Article Full Text PDF |
||
| 4. | Cryptanalysis of NTRU with two Public Keys
|
|
| Abderrahmane Nitaj, Vol. 16, No. 2, 2014, pp. 112-117 Article Full Text PDF |
||
| 5. | On the Design of RNS Bases for Modular Multiplication
|
|
| Mohammad Esmaeildoust, Keivan Navi, Shirin Rezaei, Marzieh Gerami, Vol. 16, No. 2, 2014, pp. 118-128 Article Full Text PDF |
||
| 6. | One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity
|
|
| Yuan Wang, Duncan S. Wong and Liusheng Huang, Vol. 16, No. 2, 2014, pp. 129-142 Article Full Text PDF |
||
| 7. | Notes on “Polynomial-Based Key Management for Secure Intra-Group and Inter-Group Communication”
|
|
| Chin-Chen Chang, Lein Harn, and Ting-Fang Cheng, Vol. 16, No. 2, 2014, pp. 143-148 Article Full Text PDF |
||
| 8. | Efficient and Secured Ant Routing Algorithm for Wireless Sensor Networks
|
|
| Benamar Kadri, Mohammed Feham, and Abdellah Mhammed, Vol. 16, No. 2, 2014, pp. 149-156 Article Full Text PDF |
||
| 9. | An Efficient MQV Key Agreement Scheme
|
|
| Li-Chin Hwang and Min-Shiang Hwang, Vol. 16, No. 2, 2014, pp. 157-160 Article Full Text PDF |
||