Quick Search:

Volume: 3, No: 2 (September 1, 2006)

International Journal of Network Security

Volume: 3, No. 2 (Cover-v3-n2.jpg)
1. Password Authentication Schemes: Current Status and Key Issues
Chwei-Shyong Tsai, Cheng-Chi Lee, and Min-Shiang Hwang, Vol. 3, No. 2, 2006, pp. 101-115
Article Full Text PDF

2. A Forward-Secure User Authentication Scheme with Smart Cards
Bin Wang and Zheng-Quan Li, Vol. 3, No. 2, 2006, pp. 116-119
Article Full Text PDF

3. A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices
Wassim Itani, Ayman Kayssi, Ali Chehab, and Camille Gaspard, Vol. 3, No. 2, 2006, pp. 120-131
Article Full Text PDF

4. A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
Sangook Moon, Vol. 3, No. 2, 2006, pp. 132-137
Article Full Text PDF

5. Security Analysis of Some Batch Verifying Signatures from Pairings
Tianjie Cao, Dongdai Lin, and Rui Xue, Vol. 3, No. 2, 2006, pp. 138-143
Article Full Text PDF

6. A Fast Semantically Secure Public Key Cryptosystem Based on Factoring
Sahadeo Padhye and Birendra Kumar Sharma, Vol. 3, No. 2, 2006, pp. 144-150
Article Full Text PDF

7. On the Security of Signature Scheme with Message Recovery and Its Application
Eun-Jun Yoon and Kee-Young Yoo, Vol. 3, No. 2, 2006, pp. 151-154
Article Full Text PDF

8. ID-based Signcryption Scheme with (t,n) Shared Unsigncryption
Fagen Li, Xiangjun Xin, and Yupu Hu, Vol. 3, No. 2, 2006, pp. 155-159
Article Full Text PDF

9. Application of Synchronous Dynamic Encryption System (SDES) in Wireless Sensor Networks
Hamdy S Soliman and Mohammed Omari, Vol. 3, No. 2, 2006, pp. 160-171
Article Full Text PDF

10. Personality Trait Based Simulation Model of the E-mail System
Mark Jyn-Huey Lim, Michael Negnevitsky, and Jacky Hartnett, Vol. 3, No. 2, 2006, pp. 172-190
Article Full Text PDF

11. Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks
Asad Amir Pirzada and Chris McDonald, Vol. 3, No. 2, 2006, pp. 191-202
Article Full Text PDF

12. Subject index to volume 3 (2006)
Article Full Text PDF

13. Author index to volume 3 (2006)
Article Full Text PDF

14. Reviewer index to volume 3 (2006)
Article Full Text PDF