| International Journal of Network Security | ||
![]() |
||
| 1. | General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
|
|
| Chunxiang Xu, Junhui Zhou, and Guozhen Xiao, Vol. 6, No. 1, 2008, pp. 1-5 Article Full Text PDF |
||
| 2. | Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace
|
|
| Francesco Palmieri, Vol. 6, No. 1, 2008, pp. 6-14 Article Full Text PDF |
||
| 3. | A Peer-based Recovery Scheme for Group Rekeying in Secure Multicast
|
|
| Qingyu Zhang and Kenneth L. Calvert, Vol. 6, No. 1, 2008, pp. 15-25 Article Full Text PDF |
||
| 4. | Constructing Efficient Certificateless Public Key Encryption with Pairing
|
|
| Yijuan Shi, Jianhua Li, and Jianjun Shi, Vol. 6, No. 1, 2008, pp. 26-32 Article Full Text PDF |
||
| 5. | A Study on the Security of Privacy Homomorphism
|
|
| Yu Yu, Jussipekka Leiwo, and Benjamin Premkumar, Vol. 6, No. 1, 2008, pp. 33-39 Article Full Text PDF |
||
| 6. | A Secure Group Key Management Scheme for Wireless Cellular Systems
|
|
| Hwayoung Um and Edward J. Delp, Vol. 6, No. 1, 2008, pp. 40-52 Article Full Text PDF |
||
| 7. | Secure Two-Way Transfer of Measurement Data
|
|
| Marko Hassinen, Maija Marttila-Kontio, Mikko Saesmaa, and Heli Tervo, Vol. 6, No. 1, 2008, pp. 53-59 Article Full Text PDF |
||
| 8. | Baseline Profile Stability for Network Anomaly Detection
|
|
| Yoohwan Kim, Ju-Yeon Jo, and Kyunghee Kim Suh, Vol. 6, No. 1, 2008, pp. 60-66 Article Full Text PDF |
||
| 9. | Group Key Management in MANETs
|
|
| Mohamed Salah Bouassida, Isabelle Chrisment, and Olivier Festor, Vol. 6, No. 1, 2008, pp. 67-79 Article Full Text PDF |
||
| 10. | Cryptanalysis of the Cryptosystem Based on DLP γ = α^a β^b
|
|
| Michal Sramka, Vol. 6, No. 1, 2008, pp. 80-81 Article Full Text PDF |
||
| 11. | Short Designated Verifier Signature Scheme and Its Identity-based Variant
|
|
| Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang, Vol. 6, No. 1, 2008, pp. 82-93 Article Full Text PDF |
||
| 12. | Re-visiting the One-Time Pad
|
|
| Nithin Nagaraj, Vivek Vaidya, and Prabhakar G. Vaidya, Vol. 6, No. 1, 2008, pp. 94-102 Article Full Text PDF |
||
| 13. | Performance Improvements on the Network Level Security Protocols
|
|
| Tarek S. Sobh, Ashraf Elgohary, and M. Zaki, Vol. 6, No. 1, 2008, pp. 103-115 Article Full Text PDF |
||
| 14. | New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme
|
|
| Da-Zhi Sun and Zhen-Fu Cao, Vol. 6, No. 1, 2008, pp. 116-120 Article Full Text PDF |
||
| 15. | Subject index to volume 6 (2008)
|
|
| Article Full Text PDF | ||
| 16. | Author index to volume 6 (2008)
|
|
| Article Full Text PDF | ||
| 17. | Reviewer index to volume 6 (2008)
|
|
| Article Full Text PDF | ||