International Journal of Network Security | ||
1. | A Multi-band Wavelet Watermarking Scheme
|
|
Xiangui Kang, Wenjun Zeng, and Jiwu Huang, Vol. 6, No. 2, 2008, pp. 121-126 Article Full Text PDF |
||
2. | Application-Specific Key Release Scheme from Biometrics
|
|
Ong Thian Song, Andrew Teoh Beng Jin, and David Chek Ling Ngo, Vol. 6, No. 2, 2008, pp. 127-133 Article Full Text PDF |
||
3. | An Identity-based Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks
|
|
Ashok Kumar Das, Vol. 6, No. 2, 2008, pp. 134-144 Article Full Text PDF |
||
4. | LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
|
|
Mohamad Eid, Hassan Artail , Ayman Kayssi, and Ali Chehab, Vol. 6, No. 2, 2008, pp. 145-157 Article Full Text PDF |
||
5. | Security Measures and Weaknesses of the GPRS Security Architecture
|
|
Christos Xenakis, Vol. 6, No. 2, 2008, pp. 158-169 Article Full Text PDF |
||
6. | Solutions to Key Exposure Problem in Ring Signature
|
|
Joseph K. Liu and Duncan S. Wong, Vol. 6, No. 2, 2008, pp. 170-180 Article Full Text PDF |
||
7. | An Authenticated Key Agreement Protocol Using Conjugacy Problem in Braid Groups
|
|
Atul Chaturvedi and Sunder Lal, Vol. 6, No. 2, 2008, pp. 181-184 Article Full Text PDF |
||
8. | Comments on the Security Flaw of Hwang et al.’s Blind Signature Scheme
|
|
Fang-Ping Chiang, Yi-Mien Lin, and Ya-Fen Chang, Vol. 6, No. 2, 2008, pp. 185-189 Article Full Text PDF |
||
9. | Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems
|
|
Zine-Eddine Abid and Wei Wang, Vol. 6, No. 2, 2008, pp. 190-200 Article Full Text PDF |
||
10. | SurePath: An Approach to Resilient Anonymous Routing
|
|
Yingwu Zhu and Yiming Hu, Vol. 6, No. 2, 2008, pp. 201-210 Article Full Text PDF |
||
11. | Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme
|
|
Mohammed Misbahuddin and C. Shoba Bindu, Vol. 6, No. 2, 2008, pp. 211-213 Article Full Text PDF |
||
12. | Security Requirements for RFID Computing Systems
|
|
Xiaolan Zhang and Brian King, Vol. 6, No. 2, 2008, pp. 214-226 Article Full Text PDF |
||
13. | A Reputation-based Trust Management System for P2P Networks
|
|
Ali Aydin Selçuk, Ersin Uzun, and Mark Reşat Pariente, Vol. 6, No. 2, 2008, pp. 227-237 Article Full Text PDF |
||
14. | Attacking LCCC Batch Verification of RSA Signatures
|
|
Martin Stanek, Vol. 6, No. 2, 2008, pp. 238-240 Article Full Text PDF |
||
15. | Subject index to volume 6 (2008)
|
|
Article Full Text PDF | ||
16. | Author index to volume 6 (2008)
|
|
Article Full Text PDF | ||
17. | Reviewer index to volume 6 (2008)
|
|
Article Full Text PDF | ||