International Journal of Network Security | ||
1. | Password Authentication Schemes: Current Status and Key Issues
|
|
Chwei-Shyong Tsai, Cheng-Chi Lee, and Min-Shiang Hwang, Vol. 3, No. 2, 2006, pp. 101-115 Article Full Text PDF |
||
2. | A Forward-Secure User Authentication Scheme with Smart Cards
|
|
Bin Wang and Zheng-Quan Li, Vol. 3, No. 2, 2006, pp. 116-119 Article Full Text PDF |
||
3. | A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices
|
|
Wassim Itani, Ayman Kayssi, Ali Chehab, and Camille Gaspard, Vol. 3, No. 2, 2006, pp. 120-131 Article Full Text PDF |
||
4. | A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
|
|
Sangook Moon, Vol. 3, No. 2, 2006, pp. 132-137 Article Full Text PDF |
||
5. | Security Analysis of Some Batch Verifying Signatures from Pairings
|
|
Tianjie Cao, Dongdai Lin, and Rui Xue, Vol. 3, No. 2, 2006, pp. 138-143 Article Full Text PDF |
||
6. | A Fast Semantically Secure Public Key Cryptosystem Based on Factoring
|
|
Sahadeo Padhye and Birendra Kumar Sharma, Vol. 3, No. 2, 2006, pp. 144-150 Article Full Text PDF |
||
7. | On the Security of Signature Scheme with Message Recovery and Its Application
|
|
Eun-Jun Yoon and Kee-Young Yoo, Vol. 3, No. 2, 2006, pp. 151-154 Article Full Text PDF |
||
8. | ID-based Signcryption Scheme with (t,n) Shared Unsigncryption
|
|
Fagen Li, Xiangjun Xin, and Yupu Hu, Vol. 3, No. 2, 2006, pp. 155-159 Article Full Text PDF |
||
9. | Application of Synchronous Dynamic Encryption System (SDES) in Wireless Sensor Networks
|
|
Hamdy S Soliman and Mohammed Omari, Vol. 3, No. 2, 2006, pp. 160-171 Article Full Text PDF |
||
10. | Personality Trait Based Simulation Model of the E-mail System
|
|
Mark Jyn-Huey Lim, Michael Negnevitsky, and Jacky Hartnett, Vol. 3, No. 2, 2006, pp. 172-190 Article Full Text PDF |
||
11. | Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks
|
|
Asad Amir Pirzada and Chris McDonald, Vol. 3, No. 2, 2006, pp. 191-202 Article Full Text PDF |
||
12. | Subject index to volume 3 (2006)
|
|
Article Full Text PDF | ||
13. | Author index to volume 3 (2006)
|
|
Article Full Text PDF | ||
14. | Reviewer index to volume 3 (2006)
|
|
Article Full Text PDF | ||