International Journal of Network Security | ||
1. | Reversible Watermarking: Current Status and Key Issues
|
|
Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, and Yen-Ping Chu, Vol. 2, No. 3, 2006, pp. 161-170 Article Full Text PDF |
||
2. | Setup-driving Verifiably Committed Signatures Within Standard Complexity Mode
|
|
Huafei Zhu, Vol. 2, No. 3, 2006, pp. 171-181 Article Full Text PDF |
||
3. | A Directed Signature Scheme Based on RSA Assumption
|
|
Rongxing Lu and Zhenfu Cao, Vol. 2, No. 3, 2006, pp. 182-186 Article Full Text PDF |
||
4. | A Class of Data-Dependent Operations
|
|
Nikolay A. Moldovyan, Alexander A. Moldovyan, and Michael A. Eremeev, Vol. 2, No. 3, 2006, pp. 187-204 Article Full Text PDF |
||
5. | A Hash-based Strong Password Authentication Protocol with User Anonymity
|
|
Kumar V. Mangipudi and Rajendra S. Katti, Vol. 2, No. 3, 2006, pp. 205-209 Article Full Text PDF |
||
6. | Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy
|
|
Zhi Zhou and Kin Choomg Yow, Vol. 2, No. 3, 2006, pp. 210-218 Article Full Text PDF |
||
7. | A Memory Symptom-based Virus Detection Approach
|
|
Hsien-Chou Liao and Yi-Hsiang Wang, Vol. 2, No. 3, 2006, pp. 219-227 Article Full Text PDF |
||
8. | Secure Internet Applications Based on Mobile Agents
|
|
Cungang Yang, Vol. 2, No. 3, 2006, pp. 228-237 Article Full Text PDF |
||
9. | Ideal Secret Sharing Schemes from Permutations
|
|
Josef Pieprzyk and Xian-Mo Zhang, Vol. 2, No. 3, 2006, pp. 238-244 Article Full Text PDF |
||
10. | Subject index to volume 2 (2006)
|
|
Article Full Text PDF | ||
11. | Author index to volume 2 (2006)
|
|
Article Full Text PDF | ||
12. | Reviewer index to volume 2 (2006)
|
|
Article Full Text PDF | ||