International Journal of Network Security | ||
1. | Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms
|
|
Nawal El-Fishawy and Osama M. Abu Zaid, Vol. 5, No. 3, 2007, pp. 241-251 Article Full Text PDF |
||
2. | A Truthful Geographic Forwarding Algorithm for Ad-hoc Networks with Selfish Nodes
|
|
Yongwei Wang, Venkata C. Giruka, and Mukesh Singhal, Vol. 5, No. 3, 2007, pp. 252-263 Article Full Text PDF |
||
3. | Efficient Directory Harvest Attacks and Countermeasures
|
|
Boldizsár Bencsáth and István Vajda, Vol. 5, No. 3, 2007, pp. 264-273 Article Full Text PDF |
||
4. | A Sequential Distinguisher for Covert Channel Identification
|
|
K. P. Subbalakshmi, Rajarathnam Chandramouli, and Nagarajan Ranganathan, Vol. 5, No. 3, 2007, pp. 274-282 Article Full Text PDF |
||
5. | Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings
|
|
Rongxing Lu and Zhenfu Cao, Vol. 5, No. 3, 2007, pp. 283-287 Article Full Text PDF |
||
6. | Formal Specification and Verification of the Intrusion-Tolerant Enclaves Protocol
|
|
Mohamed Layouni, Jozef Hooman, and Sofiène Tahar, Vol. 5, No. 3, 2007, pp. 288-298 Article Full Text PDF |
||
7. | A Policy-Oriented Language for Expressing Security Specifications
|
|
Carlos Ribeiro and Paulo Ferreira, Vol. 5, No. 3, 2007, pp. 299-316 Article Full Text PDF |
||
8. | A Biometric Identity Based Signature Scheme
|
|
Andrew Burnett, Fergus Byrne, Tom Dowling, and Adam Duffy, Vol. 5, No. 3, 2007, pp. 317-326 Article Full Text PDF |
||
9. | Elliptic Curve Cryptography Based Wireless Authentication Protocol
|
|
Liu Yongliang, Wen Gao, Hongxun Yao, and Xinghua Yu, Vol. 5, No. 3, 2007, pp. 327-337 Article Full Text PDF |
||
10. | Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
|
|
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, Vol. 5, No. 3, 2007, pp. 338-346 Article Full Text PDF |
||
11. | Secure Error Signalling for Packet-Switched Networks - The Future Core Networks System Error Protocol
|
|
Theodore Stergiou and Dimitrios L. Delivasilis, Vol. 5, No. 3, 2007, pp. 347-358 Article Full Text PDF |
||
12. | Subject index to volume 5 (2007)
|
|
Article Full Text PDF | ||
13. | Author index to volume 5 (2007)
|
|
Article Full Text PDF | ||
14. | Reviewer index to volume 5 (2007)
|
|
Article Full Text PDF | ||