International Journal of Network Security | ||
1. | Novel Secure Communication Protocol for Conditional Access System
|
|
Liu Yongliang, Xiaolin Yang, Hongxun Yao, and Wen Gao, Vol. 5, No. 2, 2007, pp. 121-127 Article Full Text PDF |
||
2. | Stream or Block Cipher for Securing VoIP?
|
|
Ashraf D. Elbayoumy and Simon J. Shepherd, Vol. 5, No. 2, 2007, pp. 128-133 Article Full Text PDF |
||
3. | An Effective Method to Implement Group Signature with Revocation
|
|
He Ge, Vol. 5, No. 2, 2007, pp. 134-139 Article Full Text PDF |
||
4. | Research on Data Hiding Capacity
|
|
Zhensong Liao, Yan Huang, and Chisong Li, Vol. 5, No. 2, 2007, pp. 140-144 Article Full Text PDF |
||
5. | Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
|
|
Afrand Agah and Sajal K. Das, Vol. 5, No. 2, 2007, pp. 145-153 Article Full Text PDF |
||
6. | Code-based Ring Signature Scheme
|
|
Dong Zheng, Xiangxue Li, and Kefei Chen, Vol. 5, No. 2, 2007, pp. 154-157 Article Full Text PDF |
||
7. | Enhanced DSR for MANET with Improved Secured Route Discovery and QoS
|
|
Anil Rawat, Prakash Dattatraya Vyavahare, and Ashwani Kumar Ramani, Vol. 5, No. 2, 2007, pp. 158-166 Article Full Text PDF |
||
8. | Toward Provable Security Against Differential and Linear Cryptanalysis for Camellia and Related Ciphers
|
|
Liam Keliher, Vol. 5, No. 2, 2007, pp. 167-175 Article Full Text PDF |
||
9. | Security Proof of the Original SOK-IBS Scheme
|
|
Xiao-Ming Lu and Deng-Guo Feng, Vol. 5, No. 2, 2007, pp. 176-181 Article Full Text PDF |
||
10. | A Traitor Tracing Scheme Based on the RSA System
|
|
Bo Yang, Hua Ma, and Shenglin Zhu, Vol. 5, No. 2, 2007, pp. 182-186 Article Full Text PDF |
||
11. | A Survey of Modeling and Analysis Approaches for Architecting Secure Software Systems
|
|
Lirong Dai and Kendra Cooper, Vol. 5, No. 2, 2007, pp. 187-198 Article Full Text PDF |
||
12. | A More Efficient Instantiation of Witness-Indistinguishable Signature
|
|
Joseph K. Liu and Duncan S. Wong, Vol. 5, No. 2, 2007, pp. 199-204 Article Full Text PDF |
||
13. | A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
|
|
Chetan Nanjunda Mathur and K. P. Subbalakshmi, Vol. 5, No. 2, 2007, pp. 205-212 Article Full Text PDF |
||
14. | A Genetic Algorithm for Cryptanalysis of DES-8
|
|
Hasan Mohammed Hasan Husein, Bayoumi I. Bayoumi, Fathy Saad Holail, Bahaa Eldin M. Hasan, and Mohammed Z. Abd El-Mageed, Vol. 5, No. 2, 2007, pp. 213-219 Article Full Text PDF |
||
15. | An Attack on Libert et al.' s ID-based Undeniable Signature Scheme
|
|
Zichen Li, C. F. Chong, Lucas Chi-Kwong Hui, Siu-Ming Yiu, K. P. Chow, Wai-Wan Tsang, H. W. Chan, and Kelvin K. H. Pun, Vol. 5, No. 2, 2007, pp. 220-223 Article Full Text PDF |
||
16. | An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture
|
|
Arshad Aziz and Nassar Ikram, Vol. 5, No. 2, 2007, pp. 224-232 Article Full Text PDF |
||
17. | A Comprehensive Secure VoIP Solution
|
|
Ashraf D. Elbayoumy and Simon Shepherd, Vol. 5, No. 2, 2007, pp. 233-240 Article Full Text PDF |
||
18. | Subject index to volume 5 (2007)
|
|
Article Full Text PDF | ||
19. | Author index to volume 5 (2007)
|
|
Article Full Text PDF | ||
20. | Reviewer index to volume 5 (2007)
|
|
Article Full Text PDF | ||