Quick Search:

Volume: 7, No: 3 (November 1, 2008)

International Journal of Network Security

Volume: 7, No. 3 (Cover-v7-n3.jpg)
1. A Fragile Associative Watermarking on 2D Barcode for Data Authentication
Jau-Ji Shen and Po-Wei Hsu, Vol. 7, No. 3, 2008, pp. 301-309
Article Full Text PDF

2. Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Yeung Siu Fung, John C.S. Lui, and David K.Y. Yau, Vol. 7, No. 3, 2008, pp. 310-322
Article Full Text PDF

3. A Key Management Scheme for Hierarchical Access Control in Group Communication
Qiong Zhang, Yuke Wang, and Jason P. Jue, Vol. 7, No. 3, 2008, pp. 323-334
Article Full Text PDF

4. Proof of Forward Security for Password-based Authenticated Key Exchange
Shuhua Wu and Yuefei Zhu, Vol. 7, No. 3, 2008, pp. 335-341
Article Full Text PDF

5. Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing
Shengbao Wang, Zhenfu Cao, and Haiyong Bao, Vol. 7, No. 3, 2008, pp. 342-347
Article Full Text PDF

6. Multi-Designated Verifiers Signatures Revisited
Sherman S. M. Chow, Vol. 7, No. 3, 2008, pp. 348-357
Article Full Text PDF

7. ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks
Ashok Kumar Das, Vol. 7, No. 3, 2008, pp. 358-369
Article Full Text PDF

8. Tamper Resistant Software Through Intent Protection
Alec Yasinsac and J. Todd McDonald, Vol. 7, No. 3, 2008, pp. 370-382
Article Full Text PDF

9. Weak Composite Diffie-Hellman
Kooshiar Azimian, Javad Mohajeri, and Mahmoud Salmasizadeh, Vol. 7, No. 3, 2008, pp. 383-387
Article Full Text PDF

10. Probabilistic Analysis and Verification of the ASW Protocol using PRISM
Salekul Islam and Mohammad Abu Zaid, Vol. 7, No. 3, 2008, pp. 388-396
Article Full Text PDF

11. Multiplicative Forward-Secure Threshold Signature Scheme
Sherman S. M. Chow, H. W. Go, Lucas C. K. Hui, and S. M. Yiu, Vol. 7, No. 3, 2008, pp. 397-403
Article Full Text PDF

12. On Cipher Design Based on Switchable Controlled Operations
Nikolay A. Moldovyan, Vol. 7, No. 3, 2008, pp. 404-415
Article Full Text PDF

13. Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality
Dan Lu, Yoshitake Kobayashi, Ken Nakayama, and Mamoru Maekawa, Vol. 7, No. 3, 2008, pp. 416-427
Article Full Text PDF

14. Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
Xin Tang, Constantine N. Manikopoulos, and Sotirios G. Ziavras, Vol. 7, No. 3, 2008, pp. 428-435
Article Full Text PDF

15. Performance Analysis of Soft Computing Based Anomaly Detectors
N. Srinivasan and V. Vaidehi, Vol. 7, No. 3, 2008, pp. 436-447
Article Full Text PDF

16. On the Security of ``Golden'' Cryptography
Ángel Martín del Rey and Gerardo Rodríguez Sánchez, Vol. 7, No. 3, 2008, pp. 448-450
Article Full Text PDF

17. Subject index to volume 7 (2008)
Article Full Text PDF

18. Author index to volume 7 (2008)
Article Full Text PDF

19. Reviewer index to volume 7 (2008)
Article Full Text PDF