Quick Search:

Volume: 6, No: 2 (March 1, 2008)

International Journal of Network Security

Volume: 6, No. 2 (Cover-v6-n2.jpg)
1. A Multi-band Wavelet Watermarking Scheme
Xiangui Kang, Wenjun Zeng, and Jiwu Huang, Vol. 6, No. 2, 2008, pp. 121-126
Article Full Text PDF

2. Application-Specific Key Release Scheme from Biometrics
Ong Thian Song, Andrew Teoh Beng Jin, and David Chek Ling Ngo, Vol. 6, No. 2, 2008, pp. 127-133
Article Full Text PDF

3. An Identity-based Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks
Ashok Kumar Das, Vol. 6, No. 2, 2008, pp. 134-144
Article Full Text PDF

4. LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
Mohamad Eid, Hassan Artail , Ayman Kayssi, and Ali Chehab, Vol. 6, No. 2, 2008, pp. 145-157
Article Full Text PDF

5. Security Measures and Weaknesses of the GPRS Security Architecture
Christos Xenakis, Vol. 6, No. 2, 2008, pp. 158-169
Article Full Text PDF

6. Solutions to Key Exposure Problem in Ring Signature
Joseph K. Liu and Duncan S. Wong, Vol. 6, No. 2, 2008, pp. 170-180
Article Full Text PDF

7. An Authenticated Key Agreement Protocol Using Conjugacy Problem in Braid Groups
Atul Chaturvedi and Sunder Lal, Vol. 6, No. 2, 2008, pp. 181-184
Article Full Text PDF

8. Comments on the Security Flaw of Hwang et al.’s Blind Signature Scheme
Fang-Ping Chiang, Yi-Mien Lin, and Ya-Fen Chang, Vol. 6, No. 2, 2008, pp. 185-189
Article Full Text PDF

9. Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems
Zine-Eddine Abid and Wei Wang, Vol. 6, No. 2, 2008, pp. 190-200
Article Full Text PDF

10. SurePath: An Approach to Resilient Anonymous Routing
Yingwu Zhu and Yiming Hu, Vol. 6, No. 2, 2008, pp. 201-210
Article Full Text PDF

11. Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme
Mohammed Misbahuddin and C. Shoba Bindu, Vol. 6, No. 2, 2008, pp. 211-213
Article Full Text PDF

12. Security Requirements for RFID Computing Systems
Xiaolan Zhang and Brian King, Vol. 6, No. 2, 2008, pp. 214-226
Article Full Text PDF

13. A Reputation-based Trust Management System for P2P Networks
Ali Aydin Selçuk, Ersin Uzun, and Mark Reşat Pariente, Vol. 6, No. 2, 2008, pp. 227-237
Article Full Text PDF

14. Attacking LCCC Batch Verification of RSA Signatures
Martin Stanek, Vol. 6, No. 2, 2008, pp. 238-240
Article Full Text PDF

15. Subject index to volume 6 (2008)
Article Full Text PDF

16. Author index to volume 6 (2008)
Article Full Text PDF

17. Reviewer index to volume 6 (2008)
Article Full Text PDF