International Journal of Network Security | ||
1. | A Fragile Associative Watermarking on 2D Barcode for Data Authentication
|
|
Jau-Ji Shen and Po-Wei Hsu, Vol. 7, No. 3, 2008, pp. 301-309 Article Full Text PDF |
||
2. | Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
|
|
Yeung Siu Fung, John C.S. Lui, and David K.Y. Yau, Vol. 7, No. 3, 2008, pp. 310-322 Article Full Text PDF |
||
3. | A Key Management Scheme for Hierarchical Access Control in Group Communication
|
|
Qiong Zhang, Yuke Wang, and Jason P. Jue, Vol. 7, No. 3, 2008, pp. 323-334 Article Full Text PDF |
||
4. | Proof of Forward Security for Password-based Authenticated Key Exchange
|
|
Shuhua Wu and Yuefei Zhu, Vol. 7, No. 3, 2008, pp. 335-341 Article Full Text PDF |
||
5. | Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
|
|
Shengbao Wang, Zhenfu Cao, and Haiyong Bao, Vol. 7, No. 3, 2008, pp. 342-347 Article Full Text PDF |
||
6. | Multi-Designated Verifiers Signatures Revisited
|
|
Sherman S. M. Chow, Vol. 7, No. 3, 2008, pp. 348-357 Article Full Text PDF |
||
7. | ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks
|
|
Ashok Kumar Das, Vol. 7, No. 3, 2008, pp. 358-369 Article Full Text PDF |
||
8. | Tamper Resistant Software Through Intent Protection
|
|
Alec Yasinsac and J. Todd McDonald, Vol. 7, No. 3, 2008, pp. 370-382 Article Full Text PDF |
||
9. | Weak Composite Diffie-Hellman
|
|
Kooshiar Azimian, Javad Mohajeri, and Mahmoud Salmasizadeh, Vol. 7, No. 3, 2008, pp. 383-387 Article Full Text PDF |
||
10. | Probabilistic Analysis and Verification of the ASW Protocol using PRISM
|
|
Salekul Islam and Mohammad Abu Zaid, Vol. 7, No. 3, 2008, pp. 388-396 Article Full Text PDF |
||
11. | Multiplicative Forward-Secure Threshold Signature Scheme
|
|
Sherman S. M. Chow, H. W. Go, Lucas C. K. Hui, and S. M. Yiu, Vol. 7, No. 3, 2008, pp. 397-403 Article Full Text PDF |
||
12. | On Cipher Design Based on Switchable Controlled Operations
|
|
Nikolay A. Moldovyan, Vol. 7, No. 3, 2008, pp. 404-415 Article Full Text PDF |
||
13. | Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality
|
|
Dan Lu, Yoshitake Kobayashi, Ken Nakayama, and Mamoru Maekawa, Vol. 7, No. 3, 2008, pp. 416-427 Article Full Text PDF |
||
14. | Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
|
|
Xin Tang, Constantine N. Manikopoulos, and Sotirios G. Ziavras, Vol. 7, No. 3, 2008, pp. 428-435 Article Full Text PDF |
||
15. | Performance Analysis of Soft Computing Based Anomaly Detectors
|
|
N. Srinivasan and V. Vaidehi, Vol. 7, No. 3, 2008, pp. 436-447 Article Full Text PDF |
||
16. | On the Security of ``Golden'' Cryptography
|
|
Ãngel MartÃn del Rey and Gerardo RodrÃguez Sánchez, Vol. 7, No. 3, 2008, pp. 448-450 Article Full Text PDF |
||
17. | Subject index to volume 7 (2008)
|
|
Article Full Text PDF | ||
18. | Author index to volume 7 (2008)
|
|
Article Full Text PDF | ||
19. | Reviewer index to volume 7 (2008)
|
|
Article Full Text PDF | ||