International Journal of Network Security | ||
1. | 3G and WLAN Interworking Security: Current Status and Key Issues
|
|
Chou-Chen Yang, Kuan-Hao Chu, and Ya-Wen Yang, Vol. 2, No. 1, 2006, pp. 1-13 Article Full Text PDF |
||
2. | Economic Models & Approaches in Information Security for Computer Networks
|
|
Nicolas Sklavos and Panagiotis Souras, Vol. 2, No. 1, 2006, pp. 14-20 Article Full Text PDF |
||
3. | Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience
|
|
Joe Cho-Ki Yau, Lucas Chi-Kwong Hui, Siu-Ming Yiu, and Bruce Siu-Nang Cheung, Vol. 2, No. 1, 2006, pp. 21-28 Article Full Text PDF |
||
4. | An Identity-based Mediated Signature Scheme from Bilinear Pairing
|
|
Xiangguo Cheng, Lifeng Guo, and Xinmei Wang, Vol. 2, No. 1, 2006, pp. 29-33 Article Full Text PDF |
||
5. | Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains
|
|
Younho Lee, Heeyoul Kim, Seong-Min Hong, and Hyunsoo Yoon, Vol. 2, No. 1, 2006, pp. 34-40 Article Full Text PDF |
||
6. | Small Size Hashes with Enhanced Security
|
|
Lars R Knudsen, Vol. 2, No. 1, 2006, pp. 41-42 Article Full Text PDF |
||
7. | A Time-stamping Proxy Signature Scheme Using Time-stamping Service
|
|
Eric Jui-Lin Lu and Cheng-Jian Huang, Vol. 2, No. 1, 2006, pp. 43-51 Article Full Text PDF |
||
8. | A Risk Analysis Approach for Biometric Authentication Technology
|
|
Arslan Broemme, Vol. 2, No. 1, 2006, pp. 52-63 Article Full Text PDF |
||
9. | Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol
|
|
Kim-Kwang Raymond Choo, Vol. 2, No. 1, 2006, pp. 64-68 Article Full Text PDF |
||
10. | Security Analysis and Improvement of Hsu et al. Threshold Proxy Signature Scheme
|
|
Lifeng Guo and Yang Liu, Vol. 2, No. 1, 2006, pp. 69-72 Article Full Text PDF |
||
11. | Cryptanalysis of Koyama Scheme
|
|
Sahadeo Padhye, Vol. 2, No. 1, 2006, pp. 73-80 Article Full Text PDF |
||
12. | Subject index to volume 2 (2006)
|
|
Article Full Text PDF | ||
13. | Author index to volume 2 (2006)
|
|
Article Full Text PDF | ||
14. | Reviewer index to volume 2 (2006)
|
|
Article Full Text PDF | ||