Quick Search:

Volume: 8, No: 3 (May 1, 2009)

International Journal of Network Security

Volume: 8, No. 3 (Cover-v8-n3.jpg)
1. Agent-based Intrusion Detection For Network-based Application
Jianping Zeng and Donghui Guo, Vol. 8, No. 3, 2009, pp. 201-210
Article Full Text PDF

2. On a Family of Minimal Candidate One-way Functions and One-way Permutations
Danilo Gligoroski, Vol. 8, No. 3, 2009, pp. 211-220
Article Full Text PDF

3. A Related Key Attack on the Feistel Type Block Ciphers
Ali Bagherzandi, Mahmoud Salmasizadeh, and Javad Mohajeri, Vol. 8, No. 3, 2009, pp. 221-226
Article Full Text PDF

4. Provably Secure Identity-based Threshold Key Escrow from Pairing
Yu Long, Zheng Gong, Kefei Chen, and Shengli Liu, Vol. 8, No. 3, 2009, pp. 227-234
Article Full Text PDF

5. An Anonymous Sealed-bid Electronic Auction Based on Ring Signature
Hu Xiong, Zhiguang Qin, and Fagen Li, Vol. 8, No. 3, 2009, pp. 235-242
Article Full Text PDF

6. LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption
Somanath Tripathy and Sukumar Nandi, Vol. 8, No. 3, 2009, pp. 243-252
Article Full Text PDF

7. Policy-driven and Content-based Web Services Security Gateway
Zein Radwan, Camille Gaspard, Ayman Kayssi, and Ali Chehab, Vol. 8, No. 3, 2009, pp. 253-265
Article Full Text PDF

8. Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack
Chunbo Ma and Jun Ao, Vol. 8, No. 3, 2009, pp. 266-270
Article Full Text PDF

9. Toward a Practical Packet Marking Approach for IP Traceback
Chao Gong and Kamil Sarac, Vol. 8, No. 3, 2009, pp. 271-281
Article Full Text PDF

10. Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks
Abedelaziz Mohaisen, DaeHun Nyang, and KyungHee Lee, Vol. 8, No. 3, 2009, pp. 282-292
Article Full Text PDF

11. Edon-R, An Infinite Family of Cryptographic Hash Functions
Danilo Gligoroski, Smile Markovski, and Ljupco Kocarev, Vol. 8, No. 3, 2009, pp. 293-300
Article Full Text PDF

12. Subject index to volume 8 (2009)
Article Full Text PDF

13. Author index to volume 8 (2009)
Article Full Text PDF

14. Reviewer index to volume 8 (2009)
Article Full Text PDF