Quick Search:

Volume: 5, No: 3 (November 1, 2007)

International Journal of Network Security

Volume: 5, No. 3 (Cover-v5-n3.jpg)
1. Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms
Nawal El-Fishawy and Osama M. Abu Zaid, Vol. 5, No. 3, 2007, pp. 241-251
Article Full Text PDF

2. A Truthful Geographic Forwarding Algorithm for Ad-hoc Networks with Selfish Nodes
Yongwei Wang, Venkata C. Giruka, and Mukesh Singhal, Vol. 5, No. 3, 2007, pp. 252-263
Article Full Text PDF

3. Efficient Directory Harvest Attacks and Countermeasures
Boldizsár Bencsáth and István Vajda, Vol. 5, No. 3, 2007, pp. 264-273
Article Full Text PDF

4. A Sequential Distinguisher for Covert Channel Identification
K. P. Subbalakshmi, Rajarathnam Chandramouli, and Nagarajan Ranganathan, Vol. 5, No. 3, 2007, pp. 274-282
Article Full Text PDF

5. Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings
Rongxing Lu and Zhenfu Cao, Vol. 5, No. 3, 2007, pp. 283-287
Article Full Text PDF

6. Formal Specification and Verification of the Intrusion-Tolerant Enclaves Protocol
Mohamed Layouni, Jozef Hooman, and Sofiène Tahar, Vol. 5, No. 3, 2007, pp. 288-298
Article Full Text PDF

7. A Policy-Oriented Language for Expressing Security Specifications
Carlos Ribeiro and Paulo Ferreira, Vol. 5, No. 3, 2007, pp. 299-316
Article Full Text PDF

8. A Biometric Identity Based Signature Scheme
Andrew Burnett, Fergus Byrne, Tom Dowling, and Adam Duffy, Vol. 5, No. 3, 2007, pp. 317-326
Article Full Text PDF

9. Elliptic Curve Cryptography Based Wireless Authentication Protocol
Liu Yongliang, Wen Gao, Hongxun Yao, and Xinghua Yu, Vol. 5, No. 3, 2007, pp. 327-337
Article Full Text PDF

10. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, Vol. 5, No. 3, 2007, pp. 338-346
Article Full Text PDF

11. Secure Error Signalling for Packet-Switched Networks - The Future Core Networks System Error Protocol
Theodore Stergiou and Dimitrios L. Delivasilis, Vol. 5, No. 3, 2007, pp. 347-358
Article Full Text PDF

12. Subject index to volume 5 (2007)
Article Full Text PDF

13. Author index to volume 5 (2007)
Article Full Text PDF

14. Reviewer index to volume 5 (2007)
Article Full Text PDF