International Journal of Network Security | ||
1. | Security Management in the Next Generation Wireless Networks
|
|
Yan Zhang and Masayuki Fujise, Vol. 3, No. 1, 2006, pp. 1-7 Article Full Text PDF |
||
2. | Efficient Key Agreement for Large and Dynamic Multicast Groups
|
|
Liming Wang and Chuan-Kun Wu, Vol. 3, No. 1, 2006, pp. 8-17 Article Full Text PDF |
||
3. | Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes
|
|
Qi Xie and Xiu-Yuan Yu, Vol. 3, No. 1, 2006, pp. 18-22 Article Full Text PDF |
||
4. | Password-based Encrypted Group Key Agreement
|
|
Ratna Dutta and Rana Barua, Vol. 3, No. 1, 2006, pp. 23-34 Article Full Text PDF |
||
5. | Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication
|
|
Rongxing Lu and Zhenfu Cao, Vol. 3, No. 1, 2006, pp. 35-38 Article Full Text PDF |
||
6. | The Improvement of YSYCT Scheme for Imbalanced Wireless Network
|
|
Jung-Wen Lo, Vol. 3, No. 1, 2006, pp. 39-43 Article Full Text PDF |
||
7. | Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices
|
|
Dimitrios L. Delivasilis, and Sokratis K. Katsikas, Vol. 3, No. 1, 2006, pp. 44-50 Article Full Text PDF |
||
8. | A Forgery Attack on A Low Computation Cost User Authentication Scheme
|
|
Eun-Jun Yoon and Kee-Young Yoo, Vol. 3, No. 1, 2006, pp. 51-53 Article Full Text PDF |
||
9. | Authenticated Access to Reserved Network Resources
|
|
Kenneth L. Calvert, Srinivasan Venkatraman, and James. N. Griffioen, Vol. 3, No. 1, 2006, pp. 54-64 Article Full Text PDF |
||
10. | Enforcing Policies in Content Manipulation Signature Schemes
|
|
Martin Stanek, Vol. 3, No. 1, 2006, pp. 65-72 Article Full Text PDF |
||
11. | Physical Security Perimeters for Wireless Local Area Networks
|
|
Vishal Bhargava and Mihail L. Sichitiu, Vol. 3, No. 1, 2006, pp. 73-84 Article Full Text PDF |
||
12. | On the Security of Lee, Kim, Kim, & Oh Key Agreement Protocol
|
|
Kim-Kwang Raymond Choo, Vol. 3, No. 1, 2006, pp. 85-94 Article Full Text PDF |
||
13. | A Cryptosystem Based on DLP γ≡αa βb mod p
|
|
Sunil Kumar Kashyap, Birendra Kumar Sharma, and Amitabh Banerjee, Vol. 3, No. 1, 2006, pp. 95-100 Article Full Text PDF |
||
14. | Subject index to volume 3 (2006)
|
|
Article Full Text PDF | ||
15. | Author index to volume 3 (2006)
|
|
Article Full Text PDF | ||
16. | Reviewer index to volume 3 (2006)
|
|
Article Full Text PDF | ||