| International Journal of Network Security | ||
![]() |
||
| 1. | A Fragile Associative Watermarking on 2D Barcode for Data Authentication
|
|
| Jau-Ji Shen and Po-Wei Hsu, Vol. 7, No. 3, 2008, pp. 301-309 Article Full Text PDF |
||
| 2. | Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
|
|
| Yeung Siu Fung, John C.S. Lui, and David K.Y. Yau, Vol. 7, No. 3, 2008, pp. 310-322 Article Full Text PDF |
||
| 3. | A Key Management Scheme for Hierarchical Access Control in Group Communication
|
|
| Qiong Zhang, Yuke Wang, and Jason P. Jue, Vol. 7, No. 3, 2008, pp. 323-334 Article Full Text PDF |
||
| 4. | Proof of Forward Security for Password-based Authenticated Key Exchange
|
|
| Shuhua Wu and Yuefei Zhu, Vol. 7, No. 3, 2008, pp. 335-341 Article Full Text PDF |
||
| 5. | Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
|
|
| Shengbao Wang, Zhenfu Cao, and Haiyong Bao, Vol. 7, No. 3, 2008, pp. 342-347 Article Full Text PDF |
||
| 6. | Multi-Designated Verifiers Signatures Revisited
|
|
| Sherman S. M. Chow, Vol. 7, No. 3, 2008, pp. 348-357 Article Full Text PDF |
||
| 7. | ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks
|
|
| Ashok Kumar Das, Vol. 7, No. 3, 2008, pp. 358-369 Article Full Text PDF |
||
| 8. | Tamper Resistant Software Through Intent Protection
|
|
| Alec Yasinsac and J. Todd McDonald, Vol. 7, No. 3, 2008, pp. 370-382 Article Full Text PDF |
||
| 9. | Weak Composite Diffie-Hellman
|
|
| Kooshiar Azimian, Javad Mohajeri, and Mahmoud Salmasizadeh, Vol. 7, No. 3, 2008, pp. 383-387 Article Full Text PDF |
||
| 10. | Probabilistic Analysis and Verification of the ASW Protocol using PRISM
|
|
| Salekul Islam and Mohammad Abu Zaid, Vol. 7, No. 3, 2008, pp. 388-396 Article Full Text PDF |
||
| 11. | Multiplicative Forward-Secure Threshold Signature Scheme
|
|
| Sherman S. M. Chow, H. W. Go, Lucas C. K. Hui, and S. M. Yiu, Vol. 7, No. 3, 2008, pp. 397-403 Article Full Text PDF |
||
| 12. | On Cipher Design Based on Switchable Controlled Operations
|
|
| Nikolay A. Moldovyan, Vol. 7, No. 3, 2008, pp. 404-415 Article Full Text PDF |
||
| 13. | Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality
|
|
| Dan Lu, Yoshitake Kobayashi, Ken Nakayama, and Mamoru Maekawa, Vol. 7, No. 3, 2008, pp. 416-427 Article Full Text PDF |
||
| 14. | Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
|
|
| Xin Tang, Constantine N. Manikopoulos, and Sotirios G. Ziavras, Vol. 7, No. 3, 2008, pp. 428-435 Article Full Text PDF |
||
| 15. | Performance Analysis of Soft Computing Based Anomaly Detectors
|
|
| N. Srinivasan and V. Vaidehi, Vol. 7, No. 3, 2008, pp. 436-447 Article Full Text PDF |
||
| 16. | On the Security of ``Golden'' Cryptography
|
|
| Ãngel MartÃn del Rey and Gerardo RodrÃguez Sánchez, Vol. 7, No. 3, 2008, pp. 448-450 Article Full Text PDF |
||
| 17. | Subject index to volume 7 (2008)
|
|
| Article Full Text PDF | ||
| 18. | Author index to volume 7 (2008)
|
|
| Article Full Text PDF | ||
| 19. | Reviewer index to volume 7 (2008)
|
|
| Article Full Text PDF | ||