| International Journal of Network Security | ||
![]() |
||
| 1. | Cryptanalysis of Syverson's Rational Exchange Protocol
|
|
| Almudena Alcaide, Juan M. Estevez-Tapiador, Julio C. Hernandez-Castro, and Arturo Ribagorda, Vol. 7, No. 2, 2008, pp. 151-156 Article Full Text PDF |
||
| 2. | A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
|
|
| L. Hernández Encinas, A. MartÃn del Rey, and J. Muñoz Masqué, Vol. 7, No. 2, 2008, pp. 157-159 Article Full Text PDF |
||
| 3. | Scalable Delay-constrained Multicast Group Key Management
|
|
| Saïd Gharout, Yacine Challal, and Abdelmadjid Bouabdallah, Vol. 7, No. 2, 2008, pp. 160-174 Article Full Text PDF |
||
| 4. | Improvement on Nominative Proxy Signature Schemes
|
|
| Zuo-Wen Tan, Vol. 7, No. 2, 2008, pp. 175-180 Article Full Text PDF |
||
| 5. | Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy
|
|
| Shengbao Wang, Zhenfu Cao, and Feng Cao, Vol. 7, No. 2, 2008, pp. 181-186 Article Full Text PDF |
||
| 6. | Further Improvements of Fast Encryption Algoirthm for Multimedia
|
|
| Depeng Li and Srinivas Sampalli, Vol. 7, No. 2, 2008, pp. 187-192 Article Full Text PDF |
||
| 7. | Customizing Cellular Message Encryption Algorithm
|
|
| Debdeep Mukhopadhyay and Dipanwita RoyChowdhury, Vol. 7, No. 2, 2008, pp. 193-201 Article Full Text PDF |
||
| 8. | A Simple User Authentication Scheme for Grid Computing
|
|
| Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, and Xiaohui Liang, Vol. 7, No. 2, 2008, pp. 202-206 Article Full Text PDF |
||
| 9. | Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
|
|
| Eyad Taqieddin, S. Jagannathan, and Ann Miller, Vol. 7, No. 2, 2008, pp. 207-217 Article Full Text PDF |
||
| 10. | Repairing Efficient Threshold Group Signature Scheme
|
|
| Zuhua Shao, Vol. 7, No. 2, 2008, pp. 218-222 Article Full Text PDF |
||
| 11. | A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
|
|
| Debasis Giri and P. D. Srivastava, Vol. 7, No. 2, 2008, pp. 223-234 Article Full Text PDF |
||
| 12. | A New General Transparency Model for Block-based Watermarking Method
|
|
| Fangjun Huang, Vol. 7, No. 2, 2008, pp. 235-239 Article Full Text PDF |
||
| 13. | Fault Tolerant Weighted Voting Algorithms
|
|
| Azad Azadmanesh, Alireza Farahani, and Lotfi Najjar, Vol. 7, No. 2, 2008, pp. 240-248 Article Full Text PDF |
||
| 14. | A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability
|
|
| Tarun Bhaskar, Narasimha Kamath B, and Soumyo D Moitra, Vol. 7, No. 2, 2008, pp. 249-260 Article Full Text PDF |
||
| 15. | Node-failure Tolerance of Topology in Wireless Sensor Networks
|
|
| Liang-Min Wang, Jian-Feng Ma, and Yan-Bo Guo, Vol. 7, No. 2, 2008, pp. 261-264 Article Full Text PDF |
||
| 16. | ID-based Weak Blind Signature From Bilinear Pairings
|
|
| Ze-mao Zhao, Vol. 7, No. 2, 2008, pp. 265-268 Article Full Text PDF |
||
| 17. | Trace Representations and Multi-rate Constructions of Two Classes of Generalized Cyclotomic Sequences
|
|
| Tongjiang Yan, Xiaoni Du, Shuqing Li, and Guozhen Xiao, Vol. 7, No. 2, 2008, pp. 269-272 Article Full Text PDF |
||
| 18. | Pass-Go: A Proposal to Improve the Usability of Graphical Passwords
|
|
| Hai Tao and Carlisle Adams, Vol. 7, No. 2, 2008, pp. 273-292 Article Full Text PDF |
||
| 19. | A New Type of Designated Confirmer Signatures for a Group of Individuals
|
|
| Baodian Wei, Fangguo Zhang, and Xiaofeng Chen, Vol. 7, No. 2, 2008, pp. 293-300 Article Full Text PDF |
||
| 20. | Subject index to volume 7 (2008)
|
|
| Article Full Text PDF | ||
| 21. | Author index to volume 7 (2008)
|
|
| Article Full Text PDF | ||
| 22. | Reviewer index to volume 7 (2008)
|
|
| Article Full Text PDF | ||