International Journal of Network Security | ||
1. | Mobility Management with Distributed AAA Architecture
|
|
Lin-huang Chang, Che Lin Lo, Jui Jen Lo, Wei Ting Liu,Chou Chen Yang, Vol. 4, No. 3, 2007, pp. 241-247 Article Full Text PDF |
||
2. | On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification
|
|
Rongxing Lu, Zhenfu Cao, and Jun Shao, Vol. 4, No. 3, 2007, pp. 248-253 Article Full Text PDF |
||
3. | Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit Plane for Multicast Content Protection
|
|
K. Karthik, D. Hatzinakos, Vol. 4, No. 3, 2007, pp. 254-265 Article Full Text PDF |
||
4. | LFSR-based Signatures with Message Recovery
|
|
Xiangxue Li, Dong Zheng, Kefei Chen, Vol. 4, No. 3, 2007, pp. 266-270 Article Full Text PDF |
||
5. | ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications
|
|
Shameem Ahmed, Moushumi Sharmin, and Sheikh Iqbal Ahamed, Vol. 4, No. 3, 2007, pp. 271-281 Article Full Text PDF |
||
6. | Related-Mode Attacks on CTR Encryption Mode
|
|
Dayin Wang,Dongdai Lin,Wenling Wu, Vol. 4, No. 3, 2007, pp. 282-287 Article Full Text PDF |
||
7. | Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner
|
|
Willy Susilo, Hiroaki Kikuchi, Vol. 4, No. 3, 2007, pp. 288-291 Article Full Text PDF |
||
8. | An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
|
|
Zonghua Zhang, Hong Shen, Yingpeng Sang, Vol. 4, No. 3, 2007, pp. 292-305 Article Full Text PDF |
||
9. | A Novel Approach to Hide Credentials
|
|
Zhensong Liao, Hai Jin, Deqin Zou, Weizhong Qiang, Vol. 4, No. 3, 2007, pp. 306-311 Article Full Text PDF |
||
10. | Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings
|
|
Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak, Vol. 4, No. 3, 2007, pp. 312-317 Article Full Text PDF |
||
11. | Privacy-Preserving Data Mining in Electronic Surveys
|
|
Justin Zhan and Stan Matwin, Vol. 4, No. 3, 2007, pp. 318-327 Article Full Text PDF |
||
12. | Evolutionary Design of Intrusion Detection Programs
|
|
Ajith Abraham, Crina Grosan, and Carlos Martin-Vide, Vol. 4, No. 3, 2007, pp. 328-339 Article Full Text PDF |
||
13. | Secure Logging for Irrefutable Administration
|
|
Paolo Dal Checco, Francesco Bergadano, Davide Cavagnino, Pasquale Andrea Nesta, Michele Miraglia, Pier Luigi Zaccone, Vol. 4, No. 3, 2007, pp. 340-347 Article Full Text PDF |
||
14. | An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies
|
|
Debasis Giri, Parmeshwary Dayal Srivastava, Vol. 4, No. 3, 2007, pp. 348-354 Article Full Text PDF |
||
15. | Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes
|
|
Tianjie Cao, Xianping Mao, Vol. 4, No. 3, 2007, pp. 355-360 Article Full Text PDF |
||
16. | Subject index to volume 4 (2007)
|
|
Article Full Text PDF | ||
17. | Author index to volume 4 (2007)
|
|
Article Full Text PDF | ||
18. | Reviewer index to volume 4 (2007)
|
|
Article Full Text PDF | ||