Quick Search:

Volume: 5, No: 2 (September 1, 2007)

International Journal of Network Security

Volume: 5, No. 2 (Cover-v5-n2.jpg)
1. Novel Secure Communication Protocol for Conditional Access System
Liu Yongliang, Xiaolin Yang, Hongxun Yao, and Wen Gao, Vol. 5, No. 2, 2007, pp. 121-127
Article Full Text PDF

2. Stream or Block Cipher for Securing VoIP?
Ashraf D. Elbayoumy and Simon J. Shepherd, Vol. 5, No. 2, 2007, pp. 128-133
Article Full Text PDF

3. An Effective Method to Implement Group Signature with Revocation
He Ge, Vol. 5, No. 2, 2007, pp. 134-139
Article Full Text PDF

4. Research on Data Hiding Capacity
Zhensong Liao, Yan Huang, and Chisong Li, Vol. 5, No. 2, 2007, pp. 140-144
Article Full Text PDF

5. Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
Afrand Agah and Sajal K. Das, Vol. 5, No. 2, 2007, pp. 145-153
Article Full Text PDF

6. Code-based Ring Signature Scheme
Dong Zheng, Xiangxue Li, and Kefei Chen, Vol. 5, No. 2, 2007, pp. 154-157
Article Full Text PDF

7. Enhanced DSR for MANET with Improved Secured Route Discovery and QoS
Anil Rawat, Prakash Dattatraya Vyavahare, and Ashwani Kumar Ramani, Vol. 5, No. 2, 2007, pp. 158-166
Article Full Text PDF

8. Toward Provable Security Against Differential and Linear Cryptanalysis for Camellia and Related Ciphers
Liam Keliher, Vol. 5, No. 2, 2007, pp. 167-175
Article Full Text PDF

9. Security Proof of the Original SOK-IBS Scheme
Xiao-Ming Lu and Deng-Guo Feng, Vol. 5, No. 2, 2007, pp. 176-181
Article Full Text PDF

10. A Traitor Tracing Scheme Based on the RSA System
Bo Yang, Hua Ma, and Shenglin Zhu, Vol. 5, No. 2, 2007, pp. 182-186
Article Full Text PDF

11. A Survey of Modeling and Analysis Approaches for Architecting Secure Software Systems
Lirong Dai and Kendra Cooper, Vol. 5, No. 2, 2007, pp. 187-198
Article Full Text PDF

12. A More Efficient Instantiation of Witness-Indistinguishable Signature
Joseph K. Liu and Duncan S. Wong, Vol. 5, No. 2, 2007, pp. 199-204
Article Full Text PDF

13. A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
Chetan Nanjunda Mathur and K. P. Subbalakshmi, Vol. 5, No. 2, 2007, pp. 205-212
Article Full Text PDF

14. A Genetic Algorithm for Cryptanalysis of DES-8
Hasan Mohammed Hasan Husein, Bayoumi I. Bayoumi, Fathy Saad Holail, Bahaa Eldin M. Hasan, and Mohammed Z. Abd El-Mageed, Vol. 5, No. 2, 2007, pp. 213-219
Article Full Text PDF

15. An Attack on Libert et al.' s ID-based Undeniable Signature Scheme
Zichen Li, C. F. Chong, Lucas Chi-Kwong Hui, Siu-Ming Yiu, K. P. Chow, Wai-Wan Tsang, H. W. Chan, and Kelvin K. H. Pun, Vol. 5, No. 2, 2007, pp. 220-223
Article Full Text PDF

16. An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture
Arshad Aziz and Nassar Ikram, Vol. 5, No. 2, 2007, pp. 224-232
Article Full Text PDF

17. A Comprehensive Secure VoIP Solution
Ashraf D. Elbayoumy and Simon Shepherd, Vol. 5, No. 2, 2007, pp. 233-240
Article Full Text PDF

18. Subject index to volume 5 (2007)
Article Full Text PDF

19. Author index to volume 5 (2007)
Article Full Text PDF

20. Reviewer index to volume 5 (2007)
Article Full Text PDF