International Journal of Network Security | ||
1. | A Method for Obtaining Deniable Public-Key Encryption
|
|
Maged Hamada Ibrahim, Vol. 8, No. 1, 2009, pp. 1-9 Article Full Text PDF |
||
2. | Natural Language Information Hiding Based on Chinese Mathematical Expression
|
|
Yuling Liu, Xingming Sun, Ingemar J. Cox, and Hong Wang, Vol. 8, No. 1, 2009, pp. 10-15 Article Full Text PDF |
||
3. | The New Block Cipher: BC2
|
|
Yusuf Kurniawan, Adang Suwandi A., M. Sukrisno Mardiyanto, Iping Supriana S., and Sarwono Sutikno, Vol. 8, No. 1, 2009, pp. 16-24 Article Full Text PDF |
||
4. | Theoretical Model, Simulation Results and Performances of a Secure Chaos-based Multi-user Communication System
|
|
Gobindar S. Sandhu and Stevan Berber, Vol. 8, No. 1, 2009, pp. 25-30 Article Full Text PDF |
||
5. | An Architecture for An XML Enabled Firewall
|
|
Andrew Blyth, Vol. 8, No. 1, 2009, pp. 31-36 Article Full Text PDF |
||
6. | Anonymity in Wireless Broadcast Networks
|
|
Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, and Avi Rubin, Vol. 8, No. 1, 2009, pp. 37-51 Article Full Text PDF |
||
7. | Identity-based Universal Designated Verifier Signature Proof System
|
|
Xiaofeng Chen, Guomin Chen, Fangguo Zhang, Baodian Wei, and Yi Mu, Vol. 8, No. 1, 2009, pp. 52-58 Article Full Text PDF |
||
8. | A Dynamic Authentication Scheme for Mobile Transactions
|
|
Sathish Babu B. and Pallapa Venkataram, Vol. 8, No. 1, 2009, pp. 59-74 Article Full Text PDF |
||
9. | A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach
|
|
Mohamed M. Nasreldin Rasslan, Yasser H. Dakroury, and Heba K. Aslan, Vol. 8, No. 1, 2009, pp. 75-89 Article Full Text PDF |
||
10. | Short Signatures from Difficulty of Factorization Problem
|
|
Nikolay A. Moldovyan, Vol. 8, No. 1, 2009, pp. 90-95 Article Full Text PDF |
||
11. | An Efficient Certificateless Signature from Pairings
|
|
Changji Wang, Dongyang Long, and Yong Tang, Vol. 8, No. 1, 2009, pp. 96-100 Article Full Text PDF |
||
12. | Subject index to volume 8 (2009)
|
|
Article Full Text PDF | ||
13. | Author index to volume 8 (2009)
|
|
Article Full Text PDF | ||
14. | Reviewer index to volume 8 (2009)
|
|
Article Full Text PDF | ||