Quick Search:

Volume: 7, No: 2 (September 1, 2008)

International Journal of Network Security

Volume: 7, No. 2 (Cover-v7-n2.jpg)
1. Cryptanalysis of Syverson's Rational Exchange Protocol
Almudena Alcaide, Juan M. Estevez-Tapiador, Julio C. Hernandez-Castro, and Arturo Ribagorda, Vol. 7, No. 2, 2008, pp. 151-156
Article Full Text PDF

2. A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
L. Hernández Encinas, A. Martín del Rey, and J. Muñoz Masqué, Vol. 7, No. 2, 2008, pp. 157-159
Article Full Text PDF

3. Scalable Delay-constrained Multicast Group Key Management
Saïd Gharout, Yacine Challal, and Abdelmadjid Bouabdallah, Vol. 7, No. 2, 2008, pp. 160-174
Article Full Text PDF

4. Improvement on Nominative Proxy Signature Schemes
Zuo-Wen Tan, Vol. 7, No. 2, 2008, pp. 175-180
Article Full Text PDF

5. Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy
Shengbao Wang, Zhenfu Cao, and Feng Cao, Vol. 7, No. 2, 2008, pp. 181-186
Article Full Text PDF

6. Further Improvements of Fast Encryption Algoirthm for Multimedia
Depeng Li and Srinivas Sampalli, Vol. 7, No. 2, 2008, pp. 187-192
Article Full Text PDF

7. Customizing Cellular Message Encryption Algorithm
Debdeep Mukhopadhyay and Dipanwita RoyChowdhury, Vol. 7, No. 2, 2008, pp. 193-201
Article Full Text PDF

8. A Simple User Authentication Scheme for Grid Computing
Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, and Xiaohui Liang, Vol. 7, No. 2, 2008, pp. 202-206
Article Full Text PDF

9. Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
Eyad Taqieddin, S. Jagannathan, and Ann Miller, Vol. 7, No. 2, 2008, pp. 207-217
Article Full Text PDF

10. Repairing Efficient Threshold Group Signature Scheme
Zuhua Shao, Vol. 7, No. 2, 2008, pp. 218-222
Article Full Text PDF

11. A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
Debasis Giri and P. D. Srivastava, Vol. 7, No. 2, 2008, pp. 223-234
Article Full Text PDF

12. A New General Transparency Model for Block-based Watermarking Method
Fangjun Huang, Vol. 7, No. 2, 2008, pp. 235-239
Article Full Text PDF

13. Fault Tolerant Weighted Voting Algorithms
Azad Azadmanesh, Alireza Farahani, and Lotfi Najjar, Vol. 7, No. 2, 2008, pp. 240-248
Article Full Text PDF

14. A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability
Tarun Bhaskar, Narasimha Kamath B, and Soumyo D Moitra, Vol. 7, No. 2, 2008, pp. 249-260
Article Full Text PDF

15. Node-failure Tolerance of Topology in Wireless Sensor Networks
Liang-Min Wang, Jian-Feng Ma, and Yan-Bo Guo, Vol. 7, No. 2, 2008, pp. 261-264
Article Full Text PDF

16. ID-based Weak Blind Signature From Bilinear Pairings
Ze-mao Zhao, Vol. 7, No. 2, 2008, pp. 265-268
Article Full Text PDF

17. Trace Representations and Multi-rate Constructions of Two Classes of Generalized Cyclotomic Sequences
Tongjiang Yan, Xiaoni Du, Shuqing Li, and Guozhen Xiao, Vol. 7, No. 2, 2008, pp. 269-272
Article Full Text PDF

18. Pass-Go: A Proposal to Improve the Usability of Graphical Passwords
Hai Tao and Carlisle Adams, Vol. 7, No. 2, 2008, pp. 273-292
Article Full Text PDF

19. A New Type of Designated Confirmer Signatures for a Group of Individuals
Baodian Wei, Fangguo Zhang, and Xiaofeng Chen, Vol. 7, No. 2, 2008, pp. 293-300
Article Full Text PDF

20. Subject index to volume 7 (2008)
Article Full Text PDF

21. Author index to volume 7 (2008)
Article Full Text PDF

22. Reviewer index to volume 7 (2008)
Article Full Text PDF