Quick Search:

Volume: 2, No: 2 (March 1, 2006)

International Journal of Network Security

Volume: 2, No. 2 (Cover-v2-n2.jpg)
1. A Study of Micro-payment Based on One-way Hash Chain
Min-Shiang Hwang and Pei-Chen Sung, Vol. 2, No. 2, 2006, pp. 81-90
Article Full Text PDF

2. Traffic Filtering and Routing in Partially-Hidden Networks
D. Nali, A. Miri, and C. Adams, Vol. 2, No. 2, 2006, pp. 91-104
Article Full Text PDF

3. Active Trial-and-error Attack on SASC Protocols
Heeyoul Kim, Younho Lee, Seong-Min Hong, and Hyunsoo Yoon, Vol. 2, No. 2, 2006, pp. 105-110
Article Full Text PDF

4. Construction of Dynamic Threshold Decryption Scheme from Pairing
Yu Long and Ke-Fei Chen, Vol. 2, No. 2, 2006, pp. 111-113
Article Full Text PDF

5. New Class of Cryptographic Primitives and Cipher Design for Networks Security
Nikolay Moldovyan, A. A. Moldovyan, M. A. Eremeev, and N. Sklavos, Vol. 2, No. 2, 2006, pp. 114-125
Article Full Text PDF

6. Joint Sparse Form of Window Three for Koblitz Curve
Yong Ding, Kwok-Wo Wong, and Yu-Min Wang, Vol. 2, No. 2, 2006, pp. 126-130
Article Full Text PDF

7. A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Animesh Patcha and Jung-Min Park, Vol. 2, No. 2, 2006, pp. 131-137
Article Full Text PDF

8. Cryptanalysis of the Secure Sessions from Weak Secrets Protocols
Jolyon Clulow, Vol. 2, No. 2, 2006, pp. 138-140
Article Full Text PDF

9. Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
Adam J. Rocke and Ronald F. DeMara, Vol. 2, No. 2, 2006, pp. 141-149
Article Full Text PDF

10. An Access Control System with Time-constraint Using Support Vector Machines
Chin-Chen Chang, Iuon-Chang Lin, and Chia-Te Liao, Vol. 2, No. 2, 2006, pp. 150-159
Article Full Text PDF

11. Subject index to volume 2 (2006)
Article Full Text PDF

12. Author index to volume 2 (2006)
Article Full Text PDF

13. Reviewer index to volume 2 (2006)
Article Full Text PDF