International Journal of Network Security  
1.  Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach


Debabrata Nayak, Deepak B. Phatak, and Ashutosh Saxena, Vol. 7, No. 1, 2008, pp. 114 Article Full Text PDF 

2.  Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols


KimKwang Raymond Choo, Vol. 7, No. 1, 2008, pp. 1523 Article Full Text PDF 

3.  Improving Security Through Analysis of Log Files Intersections


Kazimierz Kowalski and Mohsen Beheshti, Vol. 7, No. 1, 2008, pp. 2430 Article Full Text PDF 

4.  Parallel Hardware Architectures for the Cryptographic Tate Pairing


Guido M. Bertoni, Luca Breveglieri, Pasqualina Fragneto, and Gerardo Pelosi, Vol. 7, No. 1, 2008, pp. 3137 Article Full Text PDF 

5.  Fast Algorithms for Determining the Minimal Polynomials of Sequences with Period kn Over GF(Pm)


Jianqin Zhou, Vol. 7, No. 1, 2008, pp. 3841 Article Full Text PDF 

6.  BandwidthConserving Multicast VoIP Teleconference System


TeckKuen Chua and David C. Pheanis, Vol. 7, No. 1, 2008, pp. 4248 Article Full Text PDF 

7.  An Update on the Analysis and Design of NMAC and HMAC Functions


Praveen Gauravaram, Shoichi Hirose, and Suganya Annadurai, Vol. 7, No. 1, 2008, pp. 4960 Article Full Text PDF 

8.  Authenticated Reliable and Semireliable Communication in Wireless Sensor Networks


Falko Dressler, Vol. 7, No. 1, 2008, pp. 6168 Article Full Text PDF 

9.  Detecting and Preventing IPspoofed Distributed DoS Attacks


Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb El Saddik, and Amiya Nayak, Vol. 7, No. 1, 2008, pp. 6980 Article Full Text PDF 

10.  Formal Specification and Verification of a Secure Micropayment Protocol


Mohamed G. Gouda and Alex X. Liu, Vol. 7, No. 1, 2008, pp. 8187 Article Full Text PDF 

11.  Towards a Framework for Federated Global Identity Management


Mehrdad Naderi, Jawed Siddiqi, Babak Akhgar, Wolfgang Orth, Norbert Meyer, Miika Tuisku, and Gregor Pipan, Vol. 7, No. 1, 2008, pp. 8899 Article Full Text PDF 

12.  A New and Efficient Signature on Commitment Values


Fangguo Zhang, Xiaofeng Chen, Yi Mu, and Willy Susilo, Vol. 7, No. 1, 2008, pp. 100105 Article Full Text PDF 

13.  Eliminating Quadratic Slowdown in TwoPrime RSA Function Sharing


Maged Hamada Ibrahim, Vol. 7, No. 1, 2008, pp. 106113 Article Full Text PDF 

14.  A Selfhealing Key Distribution Scheme with Novel Properties


Biming Tian and Mingxing He, Vol. 7, No. 1, 2008, pp. 114119 Article Full Text PDF 

15.  Efficient User Authentication and Key Agreement with User Privacy Protection


WenShenq Juang and JingLin Wu, Vol. 7, No. 1, 2008, pp. 120129 Article Full Text PDF 

16.  On the Effectiveness of ContinuousTime Mixes under FlowCorrelation Based Anonymity Attacks


Ye Zhu, Xinwen Fu, and Riccardo Bettati, Vol. 7, No. 1, 2008, pp. 130140 Article Full Text PDF 

17.  Software Implementations of Elliptic Curve Cryptography


Zhijie Jerry Shi and Hai Yun, Vol. 7, No. 1, 2008, pp. 141150 Article Full Text PDF 

18.  Subject index to volume 7 (2008)


Article Full Text PDF  
19.  Author index to volume 7 (2008)


Article Full Text PDF  
20.  Reviewer index to volume 7 (2008)


Article Full Text PDF  