| International Journal of Network Security | ||
![]() |
||
| 1. | Agent-based Intrusion Detection For Network-based Application
|
|
| Jianping Zeng and Donghui Guo, Vol. 8, No. 3, 2009, pp. 201-210 Article Full Text PDF |
||
| 2. | On a Family of Minimal Candidate One-way Functions and One-way Permutations
|
|
| Danilo Gligoroski, Vol. 8, No. 3, 2009, pp. 211-220 Article Full Text PDF |
||
| 3. | A Related Key Attack on the Feistel Type Block Ciphers
|
|
| Ali Bagherzandi, Mahmoud Salmasizadeh, and Javad Mohajeri, Vol. 8, No. 3, 2009, pp. 221-226 Article Full Text PDF |
||
| 4. | Provably Secure Identity-based Threshold Key Escrow from Pairing
|
|
| Yu Long, Zheng Gong, Kefei Chen, and Shengli Liu, Vol. 8, No. 3, 2009, pp. 227-234 Article Full Text PDF |
||
| 5. | An Anonymous Sealed-bid Electronic Auction Based on Ring Signature
|
|
| Hu Xiong, Zhiguang Qin, and Fagen Li, Vol. 8, No. 3, 2009, pp. 235-242 Article Full Text PDF |
||
| 6. | LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption
|
|
| Somanath Tripathy and Sukumar Nandi, Vol. 8, No. 3, 2009, pp. 243-252 Article Full Text PDF |
||
| 7. | Policy-driven and Content-based Web Services Security Gateway
|
|
| Zein Radwan, Camille Gaspard, Ayman Kayssi, and Ali Chehab, Vol. 8, No. 3, 2009, pp. 253-265 Article Full Text PDF |
||
| 8. | Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack
|
|
| Chunbo Ma and Jun Ao, Vol. 8, No. 3, 2009, pp. 266-270 Article Full Text PDF |
||
| 9. | Toward a Practical Packet Marking Approach for IP Traceback
|
|
| Chao Gong and Kamil Sarac, Vol. 8, No. 3, 2009, pp. 271-281 Article Full Text PDF |
||
| 10. | Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks
|
|
| Abedelaziz Mohaisen, DaeHun Nyang, and KyungHee Lee, Vol. 8, No. 3, 2009, pp. 282-292 Article Full Text PDF |
||
| 11. | Edon-R, An Infinite Family of Cryptographic Hash Functions
|
|
| Danilo Gligoroski, Smile Markovski, and Ljupco Kocarev, Vol. 8, No. 3, 2009, pp. 293-300 Article Full Text PDF |
||
| 12. | Subject index to volume 8 (2009)
|
|
| Article Full Text PDF | ||
| 13. | Author index to volume 8 (2009)
|
|
| Article Full Text PDF | ||
| 14. | Reviewer index to volume 8 (2009)
|
|
| Article Full Text PDF | ||