International Journal of Network Security | ||
1. | General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
|
|
Chunxiang Xu, Junhui Zhou, and Guozhen Xiao, Vol. 6, No. 1, 2008, pp. 1-5 Article Full Text PDF |
||
2. | Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace
|
|
Francesco Palmieri, Vol. 6, No. 1, 2008, pp. 6-14 Article Full Text PDF |
||
3. | A Peer-based Recovery Scheme for Group Rekeying in Secure Multicast
|
|
Qingyu Zhang and Kenneth L. Calvert, Vol. 6, No. 1, 2008, pp. 15-25 Article Full Text PDF |
||
4. | Constructing Efficient Certificateless Public Key Encryption with Pairing
|
|
Yijuan Shi, Jianhua Li, and Jianjun Shi, Vol. 6, No. 1, 2008, pp. 26-32 Article Full Text PDF |
||
5. | A Study on the Security of Privacy Homomorphism
|
|
Yu Yu, Jussipekka Leiwo, and Benjamin Premkumar, Vol. 6, No. 1, 2008, pp. 33-39 Article Full Text PDF |
||
6. | A Secure Group Key Management Scheme for Wireless Cellular Systems
|
|
Hwayoung Um and Edward J. Delp, Vol. 6, No. 1, 2008, pp. 40-52 Article Full Text PDF |
||
7. | Secure Two-Way Transfer of Measurement Data
|
|
Marko Hassinen, Maija Marttila-Kontio, Mikko Saesmaa, and Heli Tervo, Vol. 6, No. 1, 2008, pp. 53-59 Article Full Text PDF |
||
8. | Baseline Profile Stability for Network Anomaly Detection
|
|
Yoohwan Kim, Ju-Yeon Jo, and Kyunghee Kim Suh, Vol. 6, No. 1, 2008, pp. 60-66 Article Full Text PDF |
||
9. | Group Key Management in MANETs
|
|
Mohamed Salah Bouassida, Isabelle Chrisment, and Olivier Festor, Vol. 6, No. 1, 2008, pp. 67-79 Article Full Text PDF |
||
10. | Cryptanalysis of the Cryptosystem Based on DLP γ = α^a β^b
|
|
Michal Sramka, Vol. 6, No. 1, 2008, pp. 80-81 Article Full Text PDF |
||
11. | Short Designated Verifier Signature Scheme and Its Identity-based Variant
|
|
Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang, Vol. 6, No. 1, 2008, pp. 82-93 Article Full Text PDF |
||
12. | Re-visiting the One-Time Pad
|
|
Nithin Nagaraj, Vivek Vaidya, and Prabhakar G. Vaidya, Vol. 6, No. 1, 2008, pp. 94-102 Article Full Text PDF |
||
13. | Performance Improvements on the Network Level Security Protocols
|
|
Tarek S. Sobh, Ashraf Elgohary, and M. Zaki, Vol. 6, No. 1, 2008, pp. 103-115 Article Full Text PDF |
||
14. | New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme
|
|
Da-Zhi Sun and Zhen-Fu Cao, Vol. 6, No. 1, 2008, pp. 116-120 Article Full Text PDF |
||
15. | Subject index to volume 6 (2008)
|
|
Article Full Text PDF | ||
16. | Author index to volume 6 (2008)
|
|
Article Full Text PDF | ||
17. | Reviewer index to volume 6 (2008)
|
|
Article Full Text PDF | ||