International Journal of Network Security | ||
1. | Agent-based Intrusion Detection For Network-based Application
|
|
Jianping Zeng and Donghui Guo, Vol. 8, No. 3, 2009, pp. 201-210 Article Full Text PDF |
||
2. | On a Family of Minimal Candidate One-way Functions and One-way Permutations
|
|
Danilo Gligoroski, Vol. 8, No. 3, 2009, pp. 211-220 Article Full Text PDF |
||
3. | A Related Key Attack on the Feistel Type Block Ciphers
|
|
Ali Bagherzandi, Mahmoud Salmasizadeh, and Javad Mohajeri, Vol. 8, No. 3, 2009, pp. 221-226 Article Full Text PDF |
||
4. | Provably Secure Identity-based Threshold Key Escrow from Pairing
|
|
Yu Long, Zheng Gong, Kefei Chen, and Shengli Liu, Vol. 8, No. 3, 2009, pp. 227-234 Article Full Text PDF |
||
5. | An Anonymous Sealed-bid Electronic Auction Based on Ring Signature
|
|
Hu Xiong, Zhiguang Qin, and Fagen Li, Vol. 8, No. 3, 2009, pp. 235-242 Article Full Text PDF |
||
6. | LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption
|
|
Somanath Tripathy and Sukumar Nandi, Vol. 8, No. 3, 2009, pp. 243-252 Article Full Text PDF |
||
7. | Policy-driven and Content-based Web Services Security Gateway
|
|
Zein Radwan, Camille Gaspard, Ayman Kayssi, and Ali Chehab, Vol. 8, No. 3, 2009, pp. 253-265 Article Full Text PDF |
||
8. | Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack
|
|
Chunbo Ma and Jun Ao, Vol. 8, No. 3, 2009, pp. 266-270 Article Full Text PDF |
||
9. | Toward a Practical Packet Marking Approach for IP Traceback
|
|
Chao Gong and Kamil Sarac, Vol. 8, No. 3, 2009, pp. 271-281 Article Full Text PDF |
||
10. | Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks
|
|
Abedelaziz Mohaisen, DaeHun Nyang, and KyungHee Lee, Vol. 8, No. 3, 2009, pp. 282-292 Article Full Text PDF |
||
11. | Edon-R, An Infinite Family of Cryptographic Hash Functions
|
|
Danilo Gligoroski, Smile Markovski, and Ljupco Kocarev, Vol. 8, No. 3, 2009, pp. 293-300 Article Full Text PDF |
||
12. | Subject index to volume 8 (2009)
|
|
Article Full Text PDF | ||
13. | Author index to volume 8 (2009)
|
|
Article Full Text PDF | ||
14. | Reviewer index to volume 8 (2009)
|
|
Article Full Text PDF | ||