| International Journal of Network Security | ||
![]() |
||
| 1. | Reversible Watermarking: Current Status and Key Issues
|
|
| Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, and Yen-Ping Chu, Vol. 2, No. 3, 2006, pp. 161-170 Article Full Text PDF |
||
| 2. | Setup-driving Verifiably Committed Signatures Within Standard Complexity Mode
|
|
| Huafei Zhu, Vol. 2, No. 3, 2006, pp. 171-181 Article Full Text PDF |
||
| 3. | A Directed Signature Scheme Based on RSA Assumption
|
|
| Rongxing Lu and Zhenfu Cao, Vol. 2, No. 3, 2006, pp. 182-186 Article Full Text PDF |
||
| 4. | A Class of Data-Dependent Operations
|
|
| Nikolay A. Moldovyan, Alexander A. Moldovyan, and Michael A. Eremeev, Vol. 2, No. 3, 2006, pp. 187-204 Article Full Text PDF |
||
| 5. | A Hash-based Strong Password Authentication Protocol with User Anonymity
|
|
| Kumar V. Mangipudi and Rajendra S. Katti, Vol. 2, No. 3, 2006, pp. 205-209 Article Full Text PDF |
||
| 6. | Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy
|
|
| Zhi Zhou and Kin Choomg Yow, Vol. 2, No. 3, 2006, pp. 210-218 Article Full Text PDF |
||
| 7. | A Memory Symptom-based Virus Detection Approach
|
|
| Hsien-Chou Liao and Yi-Hsiang Wang, Vol. 2, No. 3, 2006, pp. 219-227 Article Full Text PDF |
||
| 8. | Secure Internet Applications Based on Mobile Agents
|
|
| Cungang Yang, Vol. 2, No. 3, 2006, pp. 228-237 Article Full Text PDF |
||
| 9. | Ideal Secret Sharing Schemes from Permutations
|
|
| Josef Pieprzyk and Xian-Mo Zhang, Vol. 2, No. 3, 2006, pp. 238-244 Article Full Text PDF |
||
| 10. | Subject index to volume 2 (2006)
|
|
| Article Full Text PDF | ||
| 11. | Author index to volume 2 (2006)
|
|
| Article Full Text PDF | ||
| 12. | Reviewer index to volume 2 (2006)
|
|
| Article Full Text PDF | ||