Quick Search:

Volume: 4, No: 3 (May 1, 2007)

International Journal of Network Security

Volume: 4, No. 3 (Cover-v4-n3.jpg)
1. Mobility Management with Distributed AAA Architecture
Lin-huang Chang, Che Lin Lo, Jui Jen Lo, Wei Ting Liu,Chou Chen Yang, Vol. 4, No. 3, 2007, pp. 241-247
Article Full Text PDF

2. On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification
Rongxing Lu, Zhenfu Cao, and Jun Shao, Vol. 4, No. 3, 2007, pp. 248-253
Article Full Text PDF

3. Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit Plane for Multicast Content Protection
K. Karthik, D. Hatzinakos, Vol. 4, No. 3, 2007, pp. 254-265
Article Full Text PDF

4. LFSR-based Signatures with Message Recovery
Xiangxue Li, Dong Zheng, Kefei Chen, Vol. 4, No. 3, 2007, pp. 266-270
Article Full Text PDF

5. ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications
Shameem Ahmed, Moushumi Sharmin, and Sheikh Iqbal Ahamed, Vol. 4, No. 3, 2007, pp. 271-281
Article Full Text PDF

6. Related-Mode Attacks on CTR Encryption Mode
Dayin Wang,Dongdai Lin,Wenling Wu, Vol. 4, No. 3, 2007, pp. 282-287
Article Full Text PDF

7. Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner
Willy Susilo, Hiroaki Kikuchi, Vol. 4, No. 3, 2007, pp. 288-291
Article Full Text PDF

8. An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
Zonghua Zhang, Hong Shen, Yingpeng Sang, Vol. 4, No. 3, 2007, pp. 292-305
Article Full Text PDF

9. A Novel Approach to Hide Credentials
Zhensong Liao, Hai Jin, Deqin Zou, Weizhong Qiang, Vol. 4, No. 3, 2007, pp. 306-311
Article Full Text PDF

10. Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings
Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak, Vol. 4, No. 3, 2007, pp. 312-317
Article Full Text PDF

11. Privacy-Preserving Data Mining in Electronic Surveys
Justin Zhan and Stan Matwin, Vol. 4, No. 3, 2007, pp. 318-327
Article Full Text PDF

12. Evolutionary Design of Intrusion Detection Programs
Ajith Abraham, Crina Grosan, and Carlos Martin-Vide, Vol. 4, No. 3, 2007, pp. 328-339
Article Full Text PDF

13. Secure Logging for Irrefutable Administration
Paolo Dal Checco, Francesco Bergadano, Davide Cavagnino, Pasquale Andrea Nesta, Michele Miraglia, Pier Luigi Zaccone, Vol. 4, No. 3, 2007, pp. 340-347
Article Full Text PDF

14. An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies
Debasis Giri, Parmeshwary Dayal Srivastava, Vol. 4, No. 3, 2007, pp. 348-354
Article Full Text PDF

15. Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes
Tianjie Cao, Xianping Mao, Vol. 4, No. 3, 2007, pp. 355-360
Article Full Text PDF

16. Subject index to volume 4 (2007)
Article Full Text PDF

17. Author index to volume 4 (2007)
Article Full Text PDF

18. Reviewer index to volume 4 (2007)
Article Full Text PDF