Quick Search:

Volume: 2, No: 3 (May 1, 2006)

International Journal of Network Security

Volume: 2, No. 3 (Cover-v2-n3.jpg)
1. Reversible Watermarking: Current Status and Key Issues
Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, and Yen-Ping Chu, Vol. 2, No. 3, 2006, pp. 161-170
Article Full Text PDF

2. Setup-driving Verifiably Committed Signatures Within Standard Complexity Mode
Huafei Zhu, Vol. 2, No. 3, 2006, pp. 171-181
Article Full Text PDF

3. A Directed Signature Scheme Based on RSA Assumption
Rongxing Lu and Zhenfu Cao, Vol. 2, No. 3, 2006, pp. 182-186
Article Full Text PDF

4. A Class of Data-Dependent Operations
Nikolay A. Moldovyan, Alexander A. Moldovyan, and Michael A. Eremeev, Vol. 2, No. 3, 2006, pp. 187-204
Article Full Text PDF

5. A Hash-based Strong Password Authentication Protocol with User Anonymity
Kumar V. Mangipudi and Rajendra S. Katti, Vol. 2, No. 3, 2006, pp. 205-209
Article Full Text PDF

6. Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy
Zhi Zhou and Kin Choomg Yow, Vol. 2, No. 3, 2006, pp. 210-218
Article Full Text PDF

7. A Memory Symptom-based Virus Detection Approach
Hsien-Chou Liao and Yi-Hsiang Wang, Vol. 2, No. 3, 2006, pp. 219-227
Article Full Text PDF

8. Secure Internet Applications Based on Mobile Agents
Cungang Yang, Vol. 2, No. 3, 2006, pp. 228-237
Article Full Text PDF

9. Ideal Secret Sharing Schemes from Permutations
Josef Pieprzyk and Xian-Mo Zhang, Vol. 2, No. 3, 2006, pp. 238-244
Article Full Text PDF

10. Subject index to volume 2 (2006)
Article Full Text PDF

11. Author index to volume 2 (2006)
Article Full Text PDF

12. Reviewer index to volume 2 (2006)
Article Full Text PDF