International Journal of Network Security | ||
1. | Improving the Novikov and Kiselev User Authentication Scheme
|
|
Min-Ho Kim and Çetin Kaya Koç, Vol. 6, No. 3, 2008, pp. 241-245 Article Full Text PDF |
||
2. | Formal Protocol Design of ESIKE Based on Authentication Tests
|
|
Rui Jiang, Aiqun Hu, and Jianhua Li, Vol. 6, No. 3, 2008, pp. 246-254 Article Full Text PDF |
||
3. | Distributed Paillier Plaintext Equivalence Test
|
|
Pei-Yih Ting and Xiao-Wei Huang, Vol. 6, No. 3, 2008, pp. 258-264 Article Full Text PDF |
||
4. | A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting
|
|
Tony Thomas and Arbind Kumar Lal, Vol. 6, No. 3, 2008, pp. 265-269 Article Full Text PDF |
||
5. | A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
|
|
Depeng Li and Srinivas Sampalli, Vol. 6, No. 3, 2008, pp. 270-281 Article Full Text PDF |
||
6. | Comments on "Improved Efficient Remote User Authentication Schemes"
|
|
Manik Lal Das, Vol. 6, No. 3, 2008, pp. 282-284 Article Full Text PDF |
||
7. | A Self-Concealing Mechanism for Authentication of Portable Communication Systems
|
|
Wei-Bin Lee and Chang-Kuo Yeh, Vol. 6, No. 3, 2008, pp. 285-290 Article Full Text PDF |
||
8. | Improved Security Mechanism for Mobile IPv6
|
|
Jing Li, Po Zhang, and Srinivas Sampalli, Vol. 6, No. 3, 2008, pp. 291-300 Article Full Text PDF |
||
9. | A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine
|
|
Zaiqiang Liu, Dongdai Lin, and Fengdeng Guo, Vol. 6, No. 3, 2008, pp. 301-308 Article Full Text PDF |
||
10. | Wavelet-based Real Time Detection of Network Traffic Anomalies
|
|
Chin-Tser Huang, Sachin Thareja, and Yong-June Shin, Vol. 6, No. 3, 2008, pp. 309-320 Article Full Text PDF |
||
11. | An Effective Anomaly Detection Method in SMTP Traffic
|
|
Hao Luo, Binxing Fang, Xiaochun Yun, and Zhigang Wu, Vol. 6, No. 3, 2008, pp. 321-330 Article Full Text PDF |
||
12. | Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
|
|
Men Long, Chwan-Hwa "John" Wu, and J. David Irwin, Vol. 6, No. 3, 2008, pp. 331-341 Article Full Text PDF |
||
13. | Cryptanalysis of Block Ciphers via Improved Particle Swarm Optimisation and Extended Simulated Annealing Techniques
|
|
Nalini N and G. Raghavendra Rao, Vol. 6, No. 3, 2008, pp. 342-353 Article Full Text PDF |
||
14. | Comparison Based Semantic Security is Probabilistic Polynomial Time Equivalent to Indistinguishability
|
|
Ali Bagherzandi, Javad Mohajeri, and Mahmoud Salmasizadeh, Vol. 6, No. 3, 2008, pp. 354-360 Article Full Text PDF |
||
15. | Subject index to volume 6 (2008)
|
|
Article Full Text PDF | ||
16. | Author index to volume 6 (2008)
|
|
Article Full Text PDF | ||
17. | Reviewer index to volume 6 (2008)
|
|
Article Full Text PDF | ||