Quick Search:

Volume: 6, No: 1 (January 1, 2008)

International Journal of Network Security

Volume: 6, No. 1 (Cover-v6-n1.jpg)
1. General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
Chunxiang Xu, Junhui Zhou, and Guozhen Xiao, Vol. 6, No. 1, 2008, pp. 1-5
Article Full Text PDF

2. Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace
Francesco Palmieri, Vol. 6, No. 1, 2008, pp. 6-14
Article Full Text PDF

3. A Peer-based Recovery Scheme for Group Rekeying in Secure Multicast
Qingyu Zhang and Kenneth L. Calvert, Vol. 6, No. 1, 2008, pp. 15-25
Article Full Text PDF

4. Constructing Efficient Certificateless Public Key Encryption with Pairing
Yijuan Shi, Jianhua Li, and Jianjun Shi, Vol. 6, No. 1, 2008, pp. 26-32
Article Full Text PDF

5. A Study on the Security of Privacy Homomorphism
Yu Yu, Jussipekka Leiwo, and Benjamin Premkumar, Vol. 6, No. 1, 2008, pp. 33-39
Article Full Text PDF

6. A Secure Group Key Management Scheme for Wireless Cellular Systems
Hwayoung Um and Edward J. Delp, Vol. 6, No. 1, 2008, pp. 40-52
Article Full Text PDF

7. Secure Two-Way Transfer of Measurement Data
Marko Hassinen, Maija Marttila-Kontio, Mikko Saesmaa, and Heli Tervo, Vol. 6, No. 1, 2008, pp. 53-59
Article Full Text PDF

8. Baseline Profile Stability for Network Anomaly Detection
Yoohwan Kim, Ju-Yeon Jo, and Kyunghee Kim Suh, Vol. 6, No. 1, 2008, pp. 60-66
Article Full Text PDF

9. Group Key Management in MANETs
Mohamed Salah Bouassida, Isabelle Chrisment, and Olivier Festor, Vol. 6, No. 1, 2008, pp. 67-79
Article Full Text PDF

10. Cryptanalysis of the Cryptosystem Based on DLP γ = α^a β^b
Michal Sramka, Vol. 6, No. 1, 2008, pp. 80-81
Article Full Text PDF

11. Short Designated Verifier Signature Scheme and Its Identity-based Variant
Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang, Vol. 6, No. 1, 2008, pp. 82-93
Article Full Text PDF

12. Re-visiting the One-Time Pad
Nithin Nagaraj, Vivek Vaidya, and Prabhakar G. Vaidya, Vol. 6, No. 1, 2008, pp. 94-102
Article Full Text PDF

13. Performance Improvements on the Network Level Security Protocols
Tarek S. Sobh, Ashraf Elgohary, and M. Zaki, Vol. 6, No. 1, 2008, pp. 103-115
Article Full Text PDF

14. New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme
Da-Zhi Sun and Zhen-Fu Cao, Vol. 6, No. 1, 2008, pp. 116-120
Article Full Text PDF

15. Subject index to volume 6 (2008)
Article Full Text PDF

16. Author index to volume 6 (2008)
Article Full Text PDF

17. Reviewer index to volume 6 (2008)
Article Full Text PDF