International Journal of Network Security | ||
1. | Security in Pervasive Computing: Current Status and Open Issues
|
|
Munirul Haque and Sheikh Iqbal Ahamed, Vol. 3, No. 3, 2006, pp. 203-214 Article Full Text PDF |
||
2. | Security on Generalized Feistel Scheme with SP Round Function
|
|
Wenling Wu, Wentao Zhang, and Dongdai Lin, Vol. 3, No. 3, 2006, pp. 215-224 Article Full Text PDF |
||
3. | Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach
|
|
Rama Murthy Garimella, Vol. 3, No. 3, 2006, pp. 225-229 Article Full Text PDF |
||
4. | Analysis of Quantization-based Audio Watermarking to D/A and A/D Conversions
|
|
Shijun Xiang and Jiwu Huang, Vol. 3, No. 3, 2006, pp. 230-238 Article Full Text PDF |
||
5. | A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz
|
|
Mustapha Hedabou, Vol. 3, No. 3, 2006, pp. 239-243 Article Full Text PDF |
||
6. | Alert Correlation for Extracting Attack Strategies
|
|
Bin Zhu and Ali A. Ghorbani, Vol. 3, No. 3, 2006, pp. 244-258 Article Full Text PDF |
||
7. | Authentication and Key Agreement Protocols Preserving Anonymity
|
|
Kumar V. Mangipudi, Rajendra S. Katti, and Huirong Fu, Vol. 3, No. 3, 2006, pp. 259-270 Article Full Text PDF |
||
8. | Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration
|
|
Khin Mi Mi Aung, Kiejin Park, and Jong Sou Park, Vol. 3, No. 3, 2006, pp. 271-278 Article Full Text PDF |
||
9. | Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems
|
|
Alberto Peinado Dominguez, Vol. 3, No. 3, 2006, pp. 279-282 Article Full Text PDF |
||
10. | Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards
|
|
Ren-Chiun Wang and Chou-Chen Yang, Vol. 3, No. 3, 2006, pp. 283-285 Article Full Text PDF |
||
11. | Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
|
|
Zuhua Shao, Vol. 3, No. 3, 2006, pp. 286-289 Article Full Text PDF |
||
12. | Attacks on An ISO/IEC 11770-2 Key Establishment Protocol
|
|
Zhaohui Cheng and Richard Comley, Vol. 3, No. 3, 2006, pp. 290-295 Article Full Text PDF |
||
13. | Is There a Shortage of Primes for Cryptography?
|
|
Samuel S. Wagstaff, Jr., Vol. 3, No. 3, 2006, pp. 296-299 Article Full Text PDF |
||
14. | Subject index to volume 3 (2006)
|
|
Article Full Text PDF | ||
15. | Author index to volume 3 (2006)
|
|
Article Full Text PDF | ||
16. | Reviewer index to volume 3 (2006)
|
|
Article Full Text PDF | ||