| International Journal of Network Security | ||
![]() |
||
| 1. | A Method for Obtaining Deniable Public-Key Encryption
|
|
| Maged Hamada Ibrahim, Vol. 8, No. 1, 2009, pp. 1-9 Article Full Text PDF |
||
| 2. | Natural Language Information Hiding Based on Chinese Mathematical Expression
|
|
| Yuling Liu, Xingming Sun, Ingemar J. Cox, and Hong Wang, Vol. 8, No. 1, 2009, pp. 10-15 Article Full Text PDF |
||
| 3. | The New Block Cipher: BC2
|
|
| Yusuf Kurniawan, Adang Suwandi A., M. Sukrisno Mardiyanto, Iping Supriana S., and Sarwono Sutikno, Vol. 8, No. 1, 2009, pp. 16-24 Article Full Text PDF |
||
| 4. | Theoretical Model, Simulation Results and Performances of a Secure Chaos-based Multi-user Communication System
|
|
| Gobindar S. Sandhu and Stevan Berber, Vol. 8, No. 1, 2009, pp. 25-30 Article Full Text PDF |
||
| 5. | An Architecture for An XML Enabled Firewall
|
|
| Andrew Blyth, Vol. 8, No. 1, 2009, pp. 31-36 Article Full Text PDF |
||
| 6. | Anonymity in Wireless Broadcast Networks
|
|
| Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, and Avi Rubin, Vol. 8, No. 1, 2009, pp. 37-51 Article Full Text PDF |
||
| 7. | Identity-based Universal Designated Verifier Signature Proof System
|
|
| Xiaofeng Chen, Guomin Chen, Fangguo Zhang, Baodian Wei, and Yi Mu, Vol. 8, No. 1, 2009, pp. 52-58 Article Full Text PDF |
||
| 8. | A Dynamic Authentication Scheme for Mobile Transactions
|
|
| Sathish Babu B. and Pallapa Venkataram, Vol. 8, No. 1, 2009, pp. 59-74 Article Full Text PDF |
||
| 9. | A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach
|
|
| Mohamed M. Nasreldin Rasslan, Yasser H. Dakroury, and Heba K. Aslan, Vol. 8, No. 1, 2009, pp. 75-89 Article Full Text PDF |
||
| 10. | Short Signatures from Difficulty of Factorization Problem
|
|
| Nikolay A. Moldovyan, Vol. 8, No. 1, 2009, pp. 90-95 Article Full Text PDF |
||
| 11. | An Efficient Certificateless Signature from Pairings
|
|
| Changji Wang, Dongyang Long, and Yong Tang, Vol. 8, No. 1, 2009, pp. 96-100 Article Full Text PDF |
||
| 12. | Subject index to volume 8 (2009)
|
|
| Article Full Text PDF | ||
| 13. | Author index to volume 8 (2009)
|
|
| Article Full Text PDF | ||
| 14. | Reviewer index to volume 8 (2009)
|
|
| Article Full Text PDF | ||