International Journal of Network Security | ||
1. | Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach
|
|
Debabrata Nayak, Deepak B. Phatak, and Ashutosh Saxena, Vol. 7, No. 1, 2008, pp. 1-14 Article Full Text PDF |
||
2. | Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
|
|
Kim-Kwang Raymond Choo, Vol. 7, No. 1, 2008, pp. 15-23 Article Full Text PDF |
||
3. | Improving Security Through Analysis of Log Files Intersections
|
|
Kazimierz Kowalski and Mohsen Beheshti, Vol. 7, No. 1, 2008, pp. 24-30 Article Full Text PDF |
||
4. | Parallel Hardware Architectures for the Cryptographic Tate Pairing
|
|
Guido M. Bertoni, Luca Breveglieri, Pasqualina Fragneto, and Gerardo Pelosi, Vol. 7, No. 1, 2008, pp. 31-37 Article Full Text PDF |
||
5. | Fast Algorithms for Determining the Minimal Polynomials of Sequences with Period kn Over GF(Pm)
|
|
Jianqin Zhou, Vol. 7, No. 1, 2008, pp. 38-41 Article Full Text PDF |
||
6. | Bandwidth-Conserving Multicast VoIP Teleconference System
|
|
Teck-Kuen Chua and David C. Pheanis, Vol. 7, No. 1, 2008, pp. 42-48 Article Full Text PDF |
||
7. | An Update on the Analysis and Design of NMAC and HMAC Functions
|
|
Praveen Gauravaram, Shoichi Hirose, and Suganya Annadurai, Vol. 7, No. 1, 2008, pp. 49-60 Article Full Text PDF |
||
8. | Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
|
|
Falko Dressler, Vol. 7, No. 1, 2008, pp. 61-68 Article Full Text PDF |
||
9. | Detecting and Preventing IP-spoofed Distributed DoS Attacks
|
|
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb El Saddik, and Amiya Nayak, Vol. 7, No. 1, 2008, pp. 69-80 Article Full Text PDF |
||
10. | Formal Specification and Verification of a Secure Micropayment Protocol
|
|
Mohamed G. Gouda and Alex X. Liu, Vol. 7, No. 1, 2008, pp. 81-87 Article Full Text PDF |
||
11. | Towards a Framework for Federated Global Identity Management
|
|
Mehrdad Naderi, Jawed Siddiqi, Babak Akhgar, Wolfgang Orth, Norbert Meyer, Miika Tuisku, and Gregor Pipan, Vol. 7, No. 1, 2008, pp. 88-99 Article Full Text PDF |
||
12. | A New and Efficient Signature on Commitment Values
|
|
Fangguo Zhang, Xiaofeng Chen, Yi Mu, and Willy Susilo, Vol. 7, No. 1, 2008, pp. 100-105 Article Full Text PDF |
||
13. | Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing
|
|
Maged Hamada Ibrahim, Vol. 7, No. 1, 2008, pp. 106-113 Article Full Text PDF |
||
14. | A Self-healing Key Distribution Scheme with Novel Properties
|
|
Biming Tian and Mingxing He, Vol. 7, No. 1, 2008, pp. 114-119 Article Full Text PDF |
||
15. | Efficient User Authentication and Key Agreement with User Privacy Protection
|
|
Wen-Shenq Juang and Jing-Lin Wu, Vol. 7, No. 1, 2008, pp. 120-129 Article Full Text PDF |
||
16. | On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
|
|
Ye Zhu, Xinwen Fu, and Riccardo Bettati, Vol. 7, No. 1, 2008, pp. 130-140 Article Full Text PDF |
||
17. | Software Implementations of Elliptic Curve Cryptography
|
|
Zhijie Jerry Shi and Hai Yun, Vol. 7, No. 1, 2008, pp. 141-150 Article Full Text PDF |
||
18. | Subject index to volume 7 (2008)
|
|
Article Full Text PDF | ||
19. | Author index to volume 7 (2008)
|
|
Article Full Text PDF | ||
20. | Reviewer index to volume 7 (2008)
|
|
Article Full Text PDF | ||