International Journal of Network Security | ||
1. | Cryptanalysis of Syverson's Rational Exchange Protocol
|
|
Almudena Alcaide, Juan M. Estevez-Tapiador, Julio C. Hernandez-Castro, and Arturo Ribagorda, Vol. 7, No. 2, 2008, pp. 151-156 Article Full Text PDF |
||
2. | A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
|
|
L. Hernández Encinas, A. MartÃn del Rey, and J. Muñoz Masqué, Vol. 7, No. 2, 2008, pp. 157-159 Article Full Text PDF |
||
3. | Scalable Delay-constrained Multicast Group Key Management
|
|
Saïd Gharout, Yacine Challal, and Abdelmadjid Bouabdallah, Vol. 7, No. 2, 2008, pp. 160-174 Article Full Text PDF |
||
4. | Improvement on Nominative Proxy Signature Schemes
|
|
Zuo-Wen Tan, Vol. 7, No. 2, 2008, pp. 175-180 Article Full Text PDF |
||
5. | Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy
|
|
Shengbao Wang, Zhenfu Cao, and Feng Cao, Vol. 7, No. 2, 2008, pp. 181-186 Article Full Text PDF |
||
6. | Further Improvements of Fast Encryption Algoirthm for Multimedia
|
|
Depeng Li and Srinivas Sampalli, Vol. 7, No. 2, 2008, pp. 187-192 Article Full Text PDF |
||
7. | Customizing Cellular Message Encryption Algorithm
|
|
Debdeep Mukhopadhyay and Dipanwita RoyChowdhury, Vol. 7, No. 2, 2008, pp. 193-201 Article Full Text PDF |
||
8. | A Simple User Authentication Scheme for Grid Computing
|
|
Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, and Xiaohui Liang, Vol. 7, No. 2, 2008, pp. 202-206 Article Full Text PDF |
||
9. | Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
|
|
Eyad Taqieddin, S. Jagannathan, and Ann Miller, Vol. 7, No. 2, 2008, pp. 207-217 Article Full Text PDF |
||
10. | Repairing Efficient Threshold Group Signature Scheme
|
|
Zuhua Shao, Vol. 7, No. 2, 2008, pp. 218-222 Article Full Text PDF |
||
11. | A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
|
|
Debasis Giri and P. D. Srivastava, Vol. 7, No. 2, 2008, pp. 223-234 Article Full Text PDF |
||
12. | A New General Transparency Model for Block-based Watermarking Method
|
|
Fangjun Huang, Vol. 7, No. 2, 2008, pp. 235-239 Article Full Text PDF |
||
13. | Fault Tolerant Weighted Voting Algorithms
|
|
Azad Azadmanesh, Alireza Farahani, and Lotfi Najjar, Vol. 7, No. 2, 2008, pp. 240-248 Article Full Text PDF |
||
14. | A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability
|
|
Tarun Bhaskar, Narasimha Kamath B, and Soumyo D Moitra, Vol. 7, No. 2, 2008, pp. 249-260 Article Full Text PDF |
||
15. | Node-failure Tolerance of Topology in Wireless Sensor Networks
|
|
Liang-Min Wang, Jian-Feng Ma, and Yan-Bo Guo, Vol. 7, No. 2, 2008, pp. 261-264 Article Full Text PDF |
||
16. | ID-based Weak Blind Signature From Bilinear Pairings
|
|
Ze-mao Zhao, Vol. 7, No. 2, 2008, pp. 265-268 Article Full Text PDF |
||
17. | Trace Representations and Multi-rate Constructions of Two Classes of Generalized Cyclotomic Sequences
|
|
Tongjiang Yan, Xiaoni Du, Shuqing Li, and Guozhen Xiao, Vol. 7, No. 2, 2008, pp. 269-272 Article Full Text PDF |
||
18. | Pass-Go: A Proposal to Improve the Usability of Graphical Passwords
|
|
Hai Tao and Carlisle Adams, Vol. 7, No. 2, 2008, pp. 273-292 Article Full Text PDF |
||
19. | A New Type of Designated Confirmer Signatures for a Group of Individuals
|
|
Baodian Wei, Fangguo Zhang, and Xiaofeng Chen, Vol. 7, No. 2, 2008, pp. 293-300 Article Full Text PDF |
||
20. | Subject index to volume 7 (2008)
|
|
Article Full Text PDF | ||
21. | Author index to volume 7 (2008)
|
|
Article Full Text PDF | ||
22. | Reviewer index to volume 7 (2008)
|
|
Article Full Text PDF | ||