Quick Search:

Volume: 5, No: 1 (July 1, 2007)

International Journal of Network Security

Volume: 5, No. 1 (Cover-v5-n1.jpg)
1. A Feature Classification Scheme For Network Intrusion Detection
Iosif-Viorel Onut, and Ali A. Ghorbani, Vol. 5, No. 1, 2007, pp. 1-15
Article Full Text PDF

2. Another Look at PMAC
Dayin Wang, Dongdai Lin, Wenling Wu, Vol. 5, No. 1, 2007, pp. 16-20
Article Full Text PDF

3. Evaluation of Distributed File Integrity Analyzers in the Presence of Tampering
Adam J. Rocke, Ronald F. DeMara and Simon Foo, Vol. 5, No. 1, 2007, pp. 21-31
Article Full Text PDF

4. Markov Chain Modelling of the Probabilistic Packet Marking Algorithm
Tsz-Yeung Wong, John Chi-Shing Lui, and Man-Hon Wong, Vol. 5, No. 1, 2007, pp. 32-40
Article Full Text PDF

5. Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
Ashish Patel, M. Shah, Rajarathnam Chandramouli, and Koduvayur P. Subbalakshmi, Vol. 5, No. 1, 2007, pp. 41-50
Article Full Text PDF

6. Establishing Authenticated Channels and Secure Identifiers in Ad-hoc Networks
Bartlomiej Sieka and Ajay D. Kshemkalyani, Vol. 5, No. 1, 2007, pp. 51-61
Article Full Text PDF

7. On the Security of Huang-Chang Multi-signature Schemes
Jianhong Zhang and Wei Zou, Vol. 5, No. 1, 2007, pp. 62-65
Article Full Text PDF

8. A Rule-based Temporal Alert Correlation System
Peyman Kabiri and Ali A. Ghorbani, Vol. 5, No. 1, 2007, pp. 66-72
Article Full Text PDF

9. Balancing Trust and Incentive in Peer-to-Peer Collaborative System
Yu Zhang, Li Lin, and Jinpeng Huai, Vol. 5, No. 1, 2007, pp. 73-81
Article Full Text PDF

10. SeReRoM: Secured Reliable Routing Scheme for Multicasting
Rajavelu Srinivasan, V. Vaidehi, K. N. Srivathsan, L. Ramesh Babu, and C. Karunagaran, Vol. 5, No. 1, 2007, pp. 82-88
Article Full Text PDF

11. An Efficient Identity-based Signature Scheme and Its Applications
Shi Cui, Pu Duan, Choong Wah Chan, and Xiangguo Cheng, Vol. 5, No. 1, 2007, pp. 89-98
Article Full Text PDF

12. A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions
Christos K. Dimitriadis and Siraj A. Shaikh, Vol. 5, No. 1, 2007, pp. 99-111
Article Full Text PDF

13. Statistical Attack Resilient Data Hiding
Palak K. Amin, Ning Liu, and Koduvayur P. Subbalakshmi, Vol. 5, No. 1, 2007, pp. 112-120
Article Full Text PDF

14. Subject index to volume 5 (2007)
Article Full Text PDF

15. Author index to volume 5 (2007)
Article Full Text PDF

16. Reviewer index to volume 5 (2007)
Article Full Text PDF