| International Journal of Network Security | ||
![]() |
||
| 1. | Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach
|
|
| Debabrata Nayak, Deepak B. Phatak, and Ashutosh Saxena, Vol. 7, No. 1, 2008, pp. 1-14 Article Full Text PDF |
||
| 2. | Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
|
|
| Kim-Kwang Raymond Choo, Vol. 7, No. 1, 2008, pp. 15-23 Article Full Text PDF |
||
| 3. | Improving Security Through Analysis of Log Files Intersections
|
|
| Kazimierz Kowalski and Mohsen Beheshti, Vol. 7, No. 1, 2008, pp. 24-30 Article Full Text PDF |
||
| 4. | Parallel Hardware Architectures for the Cryptographic Tate Pairing
|
|
| Guido M. Bertoni, Luca Breveglieri, Pasqualina Fragneto, and Gerardo Pelosi, Vol. 7, No. 1, 2008, pp. 31-37 Article Full Text PDF |
||
| 5. | Fast Algorithms for Determining the Minimal Polynomials of Sequences with Period kn Over GF(Pm)
|
|
| Jianqin Zhou, Vol. 7, No. 1, 2008, pp. 38-41 Article Full Text PDF |
||
| 6. | Bandwidth-Conserving Multicast VoIP Teleconference System
|
|
| Teck-Kuen Chua and David C. Pheanis, Vol. 7, No. 1, 2008, pp. 42-48 Article Full Text PDF |
||
| 7. | An Update on the Analysis and Design of NMAC and HMAC Functions
|
|
| Praveen Gauravaram, Shoichi Hirose, and Suganya Annadurai, Vol. 7, No. 1, 2008, pp. 49-60 Article Full Text PDF |
||
| 8. | Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
|
|
| Falko Dressler, Vol. 7, No. 1, 2008, pp. 61-68 Article Full Text PDF |
||
| 9. | Detecting and Preventing IP-spoofed Distributed DoS Attacks
|
|
| Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb El Saddik, and Amiya Nayak, Vol. 7, No. 1, 2008, pp. 69-80 Article Full Text PDF |
||
| 10. | Formal Specification and Verification of a Secure Micropayment Protocol
|
|
| Mohamed G. Gouda and Alex X. Liu, Vol. 7, No. 1, 2008, pp. 81-87 Article Full Text PDF |
||
| 11. | Towards a Framework for Federated Global Identity Management
|
|
| Mehrdad Naderi, Jawed Siddiqi, Babak Akhgar, Wolfgang Orth, Norbert Meyer, Miika Tuisku, and Gregor Pipan, Vol. 7, No. 1, 2008, pp. 88-99 Article Full Text PDF |
||
| 12. | A New and Efficient Signature on Commitment Values
|
|
| Fangguo Zhang, Xiaofeng Chen, Yi Mu, and Willy Susilo, Vol. 7, No. 1, 2008, pp. 100-105 Article Full Text PDF |
||
| 13. | Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing
|
|
| Maged Hamada Ibrahim, Vol. 7, No. 1, 2008, pp. 106-113 Article Full Text PDF |
||
| 14. | A Self-healing Key Distribution Scheme with Novel Properties
|
|
| Biming Tian and Mingxing He, Vol. 7, No. 1, 2008, pp. 114-119 Article Full Text PDF |
||
| 15. | Efficient User Authentication and Key Agreement with User Privacy Protection
|
|
| Wen-Shenq Juang and Jing-Lin Wu, Vol. 7, No. 1, 2008, pp. 120-129 Article Full Text PDF |
||
| 16. | On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
|
|
| Ye Zhu, Xinwen Fu, and Riccardo Bettati, Vol. 7, No. 1, 2008, pp. 130-140 Article Full Text PDF |
||
| 17. | Software Implementations of Elliptic Curve Cryptography
|
|
| Zhijie Jerry Shi and Hai Yun, Vol. 7, No. 1, 2008, pp. 141-150 Article Full Text PDF |
||
| 18. | Subject index to volume 7 (2008)
|
|
| Article Full Text PDF | ||
| 19. | Author index to volume 7 (2008)
|
|
| Article Full Text PDF | ||
| 20. | Reviewer index to volume 7 (2008)
|
|
| Article Full Text PDF | ||