| International Journal of Network Security | ||
![]() |
||
| 1. | Ordered Semiring-based Trust Establish Model with Risk Evaluating
|
|
| Mingwu Zhang, Bo Yang, Shenglin Zhu, and Wenzheng Zhang, Vol. 8, No. 2, 2009, pp. 101-106 Article Full Text PDF |
||
| 2. | Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks
|
|
| Biju Issac, Vol. 8, No. 2, 2009, pp. 107-118 Article Full Text PDF |
||
| 3. | On Post Decryption Error Pobability in Counter Mode Operation with Explicit Counter Transmittal
|
|
| Fouz Sattar and Muid Mufti, Vol. 8, No. 2, 2009, pp. 119-124 Article Full Text PDF |
||
| 4. | An Efficient Verifiably Encrypted Signature Scheme without Random Oracles
|
|
| Yang Ming and Yumin Wang, Vol. 8, No. 2, 2009, pp. 125-130 Article Full Text PDF |
||
| 5. | Virtual Invisible Disk Design for Information System Security
|
|
| Faisal Nabi, Vol. 8, No. 2, 2009, pp. 131-138 Article Full Text PDF |
||
| 6. | Efficient Dealer-Less Threshold Sharing of Standard RSA
|
|
| Maged Hamada Ibrahim, Vol. 8, No. 2, 2009, pp. 139-150 Article Full Text PDF |
||
| 7. | Universal Encrypted Deniable Authentication Protocol
|
|
| Zhenfu Cao, Vol. 8, No. 2, 2009, pp. 151-158 Article Full Text PDF |
||
| 8. | Receiver-deniable Public-Key Encryption
|
|
| Maged Hamada Ibrahim, Vol. 8, No. 2, 2009, pp. 159-165 Article Full Text PDF |
||
| 9. | Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks
|
|
| Chun-Ta Li and Yen-Ping Chu, Vol. 8, No. 2, 2009, pp. 166-168 Article Full Text PDF |
||
| 10. | Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF(2^n)
|
|
| Brian King, Vol. 8, No. 2, 2009, pp. 169-176 Article Full Text PDF |
||
| 11. | A Genetic Algorithm for Cryptanalysis with Application to DES-like Systems
|
|
| Hasan Mohammed Hasan Husei, Bayoumi I. Bayoumi, Fathy Saad Holail, Bahaa Eldin M. Hasan, and Mohammed Z. Abd El-Mageed, Vol. 8, No. 2, 2009, pp. 177-186 Article Full Text PDF |
||
| 12. | Rank Functions Based Inference System for Group Key Management Protocols Verification
|
|
| Amjad Gawanmeh, Adel Bouhoula, and Sofiène Tahar, Vol. 8, No. 2, 2009, pp. 187-198 Article Full Text PDF |
||
| 13. | Remarks on Zhang-Kim's Key Authentication Scheme
|
|
| Jie Liu and Jianhua Li, Vol. 8, No. 2, 2009, pp. 199-200 Article Full Text PDF |
||
| 14. | Subject index to volume 8 (2009)
|
|
| Article Full Text PDF | ||
| 15. | Author index to volume 8 (2009)
|
|
| Article Full Text PDF | ||
| 16. | Reviewer index to volume 8 (2009)
|
|
| Article Full Text PDF | ||