Quick Search:

Volume: 3, No: 3 (November 1, 2006)

International Journal of Network Security

Volume: 3, No. 3 (Cover-v3-n3.jpg)
1. Security in Pervasive Computing: Current Status and Open Issues
Munirul Haque and Sheikh Iqbal Ahamed, Vol. 3, No. 3, 2006, pp. 203-214
Article Full Text PDF

2. Security on Generalized Feistel Scheme with SP Round Function
Wenling Wu, Wentao Zhang, and Dongdai Lin, Vol. 3, No. 3, 2006, pp. 215-224
Article Full Text PDF

3. Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach
Rama Murthy Garimella, Vol. 3, No. 3, 2006, pp. 225-229
Article Full Text PDF

4. Analysis of Quantization-based Audio Watermarking to D/A and A/D Conversions
Shijun Xiang and Jiwu Huang, Vol. 3, No. 3, 2006, pp. 230-238
Article Full Text PDF

5. A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz
Mustapha Hedabou, Vol. 3, No. 3, 2006, pp. 239-243
Article Full Text PDF

6. Alert Correlation for Extracting Attack Strategies
Bin Zhu and Ali A. Ghorbani, Vol. 3, No. 3, 2006, pp. 244-258
Article Full Text PDF

7. Authentication and Key Agreement Protocols Preserving Anonymity
Kumar V. Mangipudi, Rajendra S. Katti, and Huirong Fu, Vol. 3, No. 3, 2006, pp. 259-270
Article Full Text PDF

8. Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration
Khin Mi Mi Aung, Kiejin Park, and Jong Sou Park, Vol. 3, No. 3, 2006, pp. 271-278
Article Full Text PDF

9. Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems
Alberto Peinado Dominguez, Vol. 3, No. 3, 2006, pp. 279-282
Article Full Text PDF

10. Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards
Ren-Chiun Wang and Chou-Chen Yang, Vol. 3, No. 3, 2006, pp. 283-285
Article Full Text PDF

11. Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
Zuhua Shao, Vol. 3, No. 3, 2006, pp. 286-289
Article Full Text PDF

12. Attacks on An ISO/IEC 11770-2 Key Establishment Protocol
Zhaohui Cheng and Richard Comley, Vol. 3, No. 3, 2006, pp. 290-295
Article Full Text PDF

13. Is There a Shortage of Primes for Cryptography?
Samuel S. Wagstaff, Jr., Vol. 3, No. 3, 2006, pp. 296-299
Article Full Text PDF

14. Subject index to volume 3 (2006)
Article Full Text PDF

15. Author index to volume 3 (2006)
Article Full Text PDF

16. Reviewer index to volume 3 (2006)
Article Full Text PDF