Quick Search:

Volume: 6, No: 3 (May 1, 2008)

International Journal of Network Security

Volume: 6, No. 3 (Cover-v6-n3.jpg)
1. Improving the Novikov and Kiselev User Authentication Scheme
Min-Ho Kim and Çetin Kaya Koç, Vol. 6, No. 3, 2008, pp. 241-245
Article Full Text PDF

2. Formal Protocol Design of ESIKE Based on Authentication Tests
Rui Jiang, Aiqun Hu, and Jianhua Li, Vol. 6, No. 3, 2008, pp. 246-254
Article Full Text PDF

3. Distributed Paillier Plaintext Equivalence Test
Pei-Yih Ting and Xiao-Wei Huang, Vol. 6, No. 3, 2008, pp. 258-264
Article Full Text PDF

4. A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting
Tony Thomas and Arbind Kumar Lal, Vol. 6, No. 3, 2008, pp. 265-269
Article Full Text PDF

5. A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
Depeng Li and Srinivas Sampalli, Vol. 6, No. 3, 2008, pp. 270-281
Article Full Text PDF

6. Comments on "Improved Efficient Remote User Authentication Schemes"
Manik Lal Das, Vol. 6, No. 3, 2008, pp. 282-284
Article Full Text PDF

7. A Self-Concealing Mechanism for Authentication of Portable Communication Systems
Wei-Bin Lee and Chang-Kuo Yeh, Vol. 6, No. 3, 2008, pp. 285-290
Article Full Text PDF

8. Improved Security Mechanism for Mobile IPv6
Jing Li, Po Zhang, and Srinivas Sampalli, Vol. 6, No. 3, 2008, pp. 291-300
Article Full Text PDF

9. A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine
Zaiqiang Liu, Dongdai Lin, and Fengdeng Guo, Vol. 6, No. 3, 2008, pp. 301-308
Article Full Text PDF

10. Wavelet-based Real Time Detection of Network Traffic Anomalies
Chin-Tser Huang, Sachin Thareja, and Yong-June Shin, Vol. 6, No. 3, 2008, pp. 309-320
Article Full Text PDF

11. An Effective Anomaly Detection Method in SMTP Traffic
Hao Luo, Binxing Fang, Xiaochun Yun, and Zhigang Wu, Vol. 6, No. 3, 2008, pp. 321-330
Article Full Text PDF

12. Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
Men Long, Chwan-Hwa "John" Wu, and J. David Irwin, Vol. 6, No. 3, 2008, pp. 331-341
Article Full Text PDF

13. Cryptanalysis of Block Ciphers via Improved Particle Swarm Optimisation and Extended Simulated Annealing Techniques
Nalini N and G. Raghavendra Rao, Vol. 6, No. 3, 2008, pp. 342-353
Article Full Text PDF

14. Comparison Based Semantic Security is Probabilistic Polynomial Time Equivalent to Indistinguishability
Ali Bagherzandi, Javad Mohajeri, and Mahmoud Salmasizadeh, Vol. 6, No. 3, 2008, pp. 354-360
Article Full Text PDF

15. Subject index to volume 6 (2008)
Article Full Text PDF

16. Author index to volume 6 (2008)
Article Full Text PDF

17. Reviewer index to volume 6 (2008)
Article Full Text PDF