International Journal of Network Security | ||
1. | Security Analysis of Double Length Compression Function Based on Block Cipher
|
|
Pin Lin, Wen-Ling Wu, Chuan-Kun Wu, Vol. 4, No. 2, 2007, pp. 121-127 Article Full Text PDF |
||
2. | Improving Indirect Key Management Scheme of Access Hierarchies
|
|
Brian J. Cacic and Ruizhong Wei, Vol. 4, No. 2, 2007, pp. 128-137 Article Full Text PDF |
||
3. | How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis
|
|
Pairat Thorncharoensri, Tianbing Xia, Yi Mu, Vol. 4, No. 2, 2007, pp. 138-148 Article Full Text PDF |
||
4. | Improved Efficient Remote User Authentication Schemes
|
|
Xiaojian Tian, Robert W. Zhu, Duncan S. Wong, Vol. 4, No. 2, 2007, pp. 149-154 Article Full Text PDF |
||
5. | A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7
|
|
Leon Pan, Vol. 4, No. 2, 2007, pp. 155-165 Article Full Text PDF |
||
6. | Broadcast Authentication With Preferred Verifiers
|
|
Mahalingam Ramkumar, Vol. 4, No. 2, 2007, pp. 166-178 Article Full Text PDF |
||
7. | Distributed Cryptographic Computing on Grid
|
|
Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei lin, Vol. 4, No. 2, 2007, pp. 179-186 Article Full Text PDF |
||
8. | ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
|
|
Amit K Awasthi, Sunder Lal, Vol. 4, No. 2, 2007, pp. 187-192 Article Full Text PDF |
||
9. | New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key
|
|
Jiguo Li, Shuhong Wang, Vol. 4, No. 2, 2007, pp. 193-200 Article Full Text PDF |
||
10. | Integrity of Mobile Agents: A New Approach
|
|
Aneta Zwierko, Zbigniew Kotulski, Vol. 4, No. 2, 2007, pp. 201-211 Article Full Text PDF |
||
11. | IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
|
|
Magdy Saeb, Meer Hamza, and Ahmed EL-Shikh, Vol. 4, No. 2, 2007, pp. 212-226 Article Full Text PDF |
||
12. | Pulsing RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks
|
|
Wei Ren, Vol. 4, No. 2, 2007, pp. 227-234 Article Full Text PDF |
||
13. | Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme
|
|
Minho Kim, Cetin Kaya Koc, Vol. 4, No. 2, 2007, pp. 235-239 Article Full Text PDF |
||
14. | Subject index to volume 4 (2007)
|
|
Article Full Text PDF | ||
15. | Author index to volume 4 (2007)
|
|
Article Full Text PDF | ||
16. | Reviewer index to volume 4 (2007)
|
|
Article Full Text PDF | ||