International Journal of Network Security | ||
1. | Ordered Semiring-based Trust Establish Model with Risk Evaluating
|
|
Mingwu Zhang, Bo Yang, Shenglin Zhu, and Wenzheng Zhang, Vol. 8, No. 2, 2009, pp. 101-106 Article Full Text PDF |
||
2. | Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks
|
|
Biju Issac, Vol. 8, No. 2, 2009, pp. 107-118 Article Full Text PDF |
||
3. | On Post Decryption Error Pobability in Counter Mode Operation with Explicit Counter Transmittal
|
|
Fouz Sattar and Muid Mufti, Vol. 8, No. 2, 2009, pp. 119-124 Article Full Text PDF |
||
4. | An Efficient Verifiably Encrypted Signature Scheme without Random Oracles
|
|
Yang Ming and Yumin Wang, Vol. 8, No. 2, 2009, pp. 125-130 Article Full Text PDF |
||
5. | Virtual Invisible Disk Design for Information System Security
|
|
Faisal Nabi, Vol. 8, No. 2, 2009, pp. 131-138 Article Full Text PDF |
||
6. | Efficient Dealer-Less Threshold Sharing of Standard RSA
|
|
Maged Hamada Ibrahim, Vol. 8, No. 2, 2009, pp. 139-150 Article Full Text PDF |
||
7. | Universal Encrypted Deniable Authentication Protocol
|
|
Zhenfu Cao, Vol. 8, No. 2, 2009, pp. 151-158 Article Full Text PDF |
||
8. | Receiver-deniable Public-Key Encryption
|
|
Maged Hamada Ibrahim, Vol. 8, No. 2, 2009, pp. 159-165 Article Full Text PDF |
||
9. | Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks
|
|
Chun-Ta Li and Yen-Ping Chu, Vol. 8, No. 2, 2009, pp. 166-168 Article Full Text PDF |
||
10. | Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF(2^n)
|
|
Brian King, Vol. 8, No. 2, 2009, pp. 169-176 Article Full Text PDF |
||
11. | A Genetic Algorithm for Cryptanalysis with Application to DES-like Systems
|
|
Hasan Mohammed Hasan Husei, Bayoumi I. Bayoumi, Fathy Saad Holail, Bahaa Eldin M. Hasan, and Mohammed Z. Abd El-Mageed, Vol. 8, No. 2, 2009, pp. 177-186 Article Full Text PDF |
||
12. | Rank Functions Based Inference System for Group Key Management Protocols Verification
|
|
Amjad Gawanmeh, Adel Bouhoula, and Sofiène Tahar, Vol. 8, No. 2, 2009, pp. 187-198 Article Full Text PDF |
||
13. | Remarks on Zhang-Kim's Key Authentication Scheme
|
|
Jie Liu and Jianhua Li, Vol. 8, No. 2, 2009, pp. 199-200 Article Full Text PDF |
||
14. | Subject index to volume 8 (2009)
|
|
Article Full Text PDF | ||
15. | Author index to volume 8 (2009)
|
|
Article Full Text PDF | ||
16. | Reviewer index to volume 8 (2009)
|
|
Article Full Text PDF | ||