International Journal of Network Security | ||
1. | A Study of Micro-payment Based on One-way Hash Chain
|
|
Min-Shiang Hwang and Pei-Chen Sung, Vol. 2, No. 2, 2006, pp. 81-90 Article Full Text PDF |
||
2. | Traffic Filtering and Routing in Partially-Hidden Networks
|
|
D. Nali, A. Miri, and C. Adams, Vol. 2, No. 2, 2006, pp. 91-104 Article Full Text PDF |
||
3. | Active Trial-and-error Attack on SASC Protocols
|
|
Heeyoul Kim, Younho Lee, Seong-Min Hong, and Hyunsoo Yoon, Vol. 2, No. 2, 2006, pp. 105-110 Article Full Text PDF |
||
4. | Construction of Dynamic Threshold Decryption Scheme from Pairing
|
|
Yu Long and Ke-Fei Chen, Vol. 2, No. 2, 2006, pp. 111-113 Article Full Text PDF |
||
5. | New Class of Cryptographic Primitives and Cipher Design for Networks Security
|
|
Nikolay Moldovyan, A. A. Moldovyan, M. A. Eremeev, and N. Sklavos, Vol. 2, No. 2, 2006, pp. 114-125 Article Full Text PDF |
||
6. | Joint Sparse Form of Window Three for Koblitz Curve
|
|
Yong Ding, Kwok-Wo Wong, and Yu-Min Wang, Vol. 2, No. 2, 2006, pp. 126-130 Article Full Text PDF |
||
7. | A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
|
|
Animesh Patcha and Jung-Min Park, Vol. 2, No. 2, 2006, pp. 131-137 Article Full Text PDF |
||
8. | Cryptanalysis of the Secure Sessions from Weak Secrets Protocols
|
|
Jolyon Clulow, Vol. 2, No. 2, 2006, pp. 138-140 Article Full Text PDF |
||
9. | Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
|
|
Adam J. Rocke and Ronald F. DeMara, Vol. 2, No. 2, 2006, pp. 141-149 Article Full Text PDF |
||
10. | An Access Control System with Time-constraint Using Support Vector Machines
|
|
Chin-Chen Chang, Iuon-Chang Lin, and Chia-Te Liao, Vol. 2, No. 2, 2006, pp. 150-159 Article Full Text PDF |
||
11. | Subject index to volume 2 (2006)
|
|
Article Full Text PDF | ||
12. | Author index to volume 2 (2006)
|
|
Article Full Text PDF | ||
13. | Reviewer index to volume 2 (2006)
|
|
Article Full Text PDF | ||