Quick Search:

Volume: 2, No: 1 (January 1, 2006)

International Journal of Network Security

Volume: 2, No. 1 (Cover-v2-n1.jpg)
1. 3G and WLAN Interworking Security: Current Status and Key Issues
Chou-Chen Yang, Kuan-Hao Chu, and Ya-Wen Yang, Vol. 2, No. 1, 2006, pp. 1-13
Article Full Text PDF

2. Economic Models & Approaches in Information Security for Computer Networks
Nicolas Sklavos and Panagiotis Souras, Vol. 2, No. 1, 2006, pp. 14-20
Article Full Text PDF

3. Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience
Joe Cho-Ki Yau, Lucas Chi-Kwong Hui, Siu-Ming Yiu, and Bruce Siu-Nang Cheung, Vol. 2, No. 1, 2006, pp. 21-28
Article Full Text PDF

4. An Identity-based Mediated Signature Scheme from Bilinear Pairing
Xiangguo Cheng, Lifeng Guo, and Xinmei Wang, Vol. 2, No. 1, 2006, pp. 29-33
Article Full Text PDF

5. Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains
Younho Lee, Heeyoul Kim, Seong-Min Hong, and Hyunsoo Yoon, Vol. 2, No. 1, 2006, pp. 34-40
Article Full Text PDF

6. Small Size Hashes with Enhanced Security
Lars R Knudsen, Vol. 2, No. 1, 2006, pp. 41-42
Article Full Text PDF

7. A Time-stamping Proxy Signature Scheme Using Time-stamping Service
Eric Jui-Lin Lu and Cheng-Jian Huang, Vol. 2, No. 1, 2006, pp. 43-51
Article Full Text PDF

8. A Risk Analysis Approach for Biometric Authentication Technology
Arslan Broemme, Vol. 2, No. 1, 2006, pp. 52-63
Article Full Text PDF

9. Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol
Kim-Kwang Raymond Choo, Vol. 2, No. 1, 2006, pp. 64-68
Article Full Text PDF

10. Security Analysis and Improvement of Hsu et al. Threshold Proxy Signature Scheme
Lifeng Guo and Yang Liu, Vol. 2, No. 1, 2006, pp. 69-72
Article Full Text PDF

11. Cryptanalysis of Koyama Scheme
Sahadeo Padhye, Vol. 2, No. 1, 2006, pp. 73-80
Article Full Text PDF

12. Subject index to volume 2 (2006)
Article Full Text PDF

13. Author index to volume 2 (2006)
Article Full Text PDF

14. Reviewer index to volume 2 (2006)
Article Full Text PDF