Quick Search:

Volume: 8, No: 2 (March 1, 2009)

International Journal of Network Security

Volume: 8, No. 2 (Cover-v8-n2.jpg)
1. Ordered Semiring-based Trust Establish Model with Risk Evaluating
Mingwu Zhang, Bo Yang, Shenglin Zhu, and Wenzheng Zhang, Vol. 8, No. 2, 2009, pp. 101-106
Article Full Text PDF

2. Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks
Biju Issac, Vol. 8, No. 2, 2009, pp. 107-118
Article Full Text PDF

3. On Post Decryption Error Pobability in Counter Mode Operation with Explicit Counter Transmittal
Fouz Sattar and Muid Mufti, Vol. 8, No. 2, 2009, pp. 119-124
Article Full Text PDF

4. An Efficient Verifiably Encrypted Signature Scheme without Random Oracles
Yang Ming and Yumin Wang, Vol. 8, No. 2, 2009, pp. 125-130
Article Full Text PDF

5. Virtual Invisible Disk Design for Information System Security
Faisal Nabi, Vol. 8, No. 2, 2009, pp. 131-138
Article Full Text PDF

6. Efficient Dealer-Less Threshold Sharing of Standard RSA
Maged Hamada Ibrahim, Vol. 8, No. 2, 2009, pp. 139-150
Article Full Text PDF

7. Universal Encrypted Deniable Authentication Protocol
Zhenfu Cao, Vol. 8, No. 2, 2009, pp. 151-158
Article Full Text PDF

8. Receiver-deniable Public-Key Encryption
Maged Hamada Ibrahim, Vol. 8, No. 2, 2009, pp. 159-165
Article Full Text PDF

9. Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks
Chun-Ta Li and Yen-Ping Chu, Vol. 8, No. 2, 2009, pp. 166-168
Article Full Text PDF

10. Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF(2^n)
Brian King, Vol. 8, No. 2, 2009, pp. 169-176
Article Full Text PDF

11. A Genetic Algorithm for Cryptanalysis with Application to DES-like Systems
Hasan Mohammed Hasan Husei, Bayoumi I. Bayoumi, Fathy Saad Holail, Bahaa Eldin M. Hasan, and Mohammed Z. Abd El-Mageed, Vol. 8, No. 2, 2009, pp. 177-186
Article Full Text PDF

12. Rank Functions Based Inference System for Group Key Management Protocols Verification
Amjad Gawanmeh, Adel Bouhoula, and Sofiène Tahar, Vol. 8, No. 2, 2009, pp. 187-198
Article Full Text PDF

13. Remarks on Zhang-Kim's Key Authentication Scheme
Jie Liu and Jianhua Li, Vol. 8, No. 2, 2009, pp. 199-200
Article Full Text PDF

14. Subject index to volume 8 (2009)
Article Full Text PDF

15. Author index to volume 8 (2009)
Article Full Text PDF

16. Reviewer index to volume 8 (2009)
Article Full Text PDF