Quick Search:

Volume: 7, No: 1 (July 1, 2008)

International Journal of Network Security

Volume: 7, No. 1 (Cover-v7-n1.jpg)
1. Evaluation of Security Architecture for Wireless Local Area Networks by Indexed Based Policy Method: A Novel Approach
Debabrata Nayak, Deepak B. Phatak, and Ashutosh Saxena, Vol. 7, No. 1, 2008, pp. 1-14
Article Full Text PDF

2. Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Kim-Kwang Raymond Choo, Vol. 7, No. 1, 2008, pp. 15-23
Article Full Text PDF

3. Improving Security Through Analysis of Log Files Intersections
Kazimierz Kowalski and Mohsen Beheshti, Vol. 7, No. 1, 2008, pp. 24-30
Article Full Text PDF

4. Parallel Hardware Architectures for the Cryptographic Tate Pairing
Guido M. Bertoni, Luca Breveglieri, Pasqualina Fragneto, and Gerardo Pelosi, Vol. 7, No. 1, 2008, pp. 31-37
Article Full Text PDF

5. Fast Algorithms for Determining the Minimal Polynomials of Sequences with Period kn Over GF(Pm)
Jianqin Zhou, Vol. 7, No. 1, 2008, pp. 38-41
Article Full Text PDF

6. Bandwidth-Conserving Multicast VoIP Teleconference System
Teck-Kuen Chua and David C. Pheanis, Vol. 7, No. 1, 2008, pp. 42-48
Article Full Text PDF

7. An Update on the Analysis and Design of NMAC and HMAC Functions
Praveen Gauravaram, Shoichi Hirose, and Suganya Annadurai, Vol. 7, No. 1, 2008, pp. 49-60
Article Full Text PDF

8. Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
Falko Dressler, Vol. 7, No. 1, 2008, pp. 61-68
Article Full Text PDF

9. Detecting and Preventing IP-spoofed Distributed DoS Attacks
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb El Saddik, and Amiya Nayak, Vol. 7, No. 1, 2008, pp. 69-80
Article Full Text PDF

10. Formal Specification and Verification of a Secure Micropayment Protocol
Mohamed G. Gouda and Alex X. Liu, Vol. 7, No. 1, 2008, pp. 81-87
Article Full Text PDF

11. Towards a Framework for Federated Global Identity Management
Mehrdad Naderi, Jawed Siddiqi, Babak Akhgar, Wolfgang Orth, Norbert Meyer, Miika Tuisku, and Gregor Pipan, Vol. 7, No. 1, 2008, pp. 88-99
Article Full Text PDF

12. A New and Efficient Signature on Commitment Values
Fangguo Zhang, Xiaofeng Chen, Yi Mu, and Willy Susilo, Vol. 7, No. 1, 2008, pp. 100-105
Article Full Text PDF

13. Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing
Maged Hamada Ibrahim, Vol. 7, No. 1, 2008, pp. 106-113
Article Full Text PDF

14. A Self-healing Key Distribution Scheme with Novel Properties
Biming Tian and Mingxing He, Vol. 7, No. 1, 2008, pp. 114-119
Article Full Text PDF

15. Efficient User Authentication and Key Agreement with User Privacy Protection
Wen-Shenq Juang and Jing-Lin Wu, Vol. 7, No. 1, 2008, pp. 120-129
Article Full Text PDF

16. On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
Ye Zhu, Xinwen Fu, and Riccardo Bettati, Vol. 7, No. 1, 2008, pp. 130-140
Article Full Text PDF

17. Software Implementations of Elliptic Curve Cryptography
Zhijie Jerry Shi and Hai Yun, Vol. 7, No. 1, 2008, pp. 141-150
Article Full Text PDF

18. Subject index to volume 7 (2008)
Article Full Text PDF

19. Author index to volume 7 (2008)
Article Full Text PDF

20. Reviewer index to volume 7 (2008)
Article Full Text PDF