International Journal of Network Security | ||
1. | Secure Two-party Protocols for Point Inclusion Problem
|
|
Tony Thomas, Vol. 9, No. 1, 2009, pp. 1-7 Article Full Text PDF |
||
2. | Remark on Shao et al.'s Bidirectional Proxy Re-signature Scheme in Indocrypt'07
|
|
Kitae Kim, Ikkwon Yie, and Seongan Lim, Vol. 9, No. 1, 2009, pp. 8-11 Article Full Text PDF |
||
3. | Efficient Nonce-based Authentication Scheme for Session Initiation Protocol
|
|
Jia Lun Tsai, Vol. 9, No. 1, 2009, pp. 12-16 Article Full Text PDF |
||
4. | Improvement on a Trapdoor Hash Function
|
|
Fuw-Yi Yang, Vol. 9, No. 1, 2009, pp. 17-21 Article Full Text PDF |
||
5. | Sybil Nodes Detection Based on Received Signal Strength Variations within VANET
|
|
Mohamed Salah Bouassida, Gilles Guette, Mohamed Shawky, and Bertrand Ducourthial, Vol. 9, No. 1, 2009, pp. 22-33 Article Full Text PDF |
||
6. | An Efficient Two-phase Spam Filtering Method Based on E-mails Categorization
|
|
Jyh-Jian Sheu, Vol. 9, No. 1, 2009, pp. 34-43 Article Full Text PDF |
||
7. | On the Order of Round Components in the AES
|
|
Jorge Nakahara Jr, Vol. 9, No. 1, 2009, pp. 44-50 Article Full Text PDF |
||
8. | Resisting Traitors in Linkable Democratic Group Signatures
|
|
Maged Hamada Ibrahim, Vol. 9, No. 1, 2009, pp. 51-60 Article Full Text PDF |
||
9. | A Survey on Distributed Access Control Systems for Web Business Processes
|
|
Hristo Koshutanski, Vol. 9, No. 1, 2009, pp. 61-69 Article Full Text PDF |
||
10. | Concurrency Control for Multilevel Secure Databases
|
|
Navdeep Kaur, Rajwinder Singh, Manoj Misra, and A. K. Sarje, Vol. 9, No. 1, 2009, pp. 70-81 Article Full Text PDF |
||
11. | Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security
|
|
M. Razvi Doomun and KMS Soyjaudah, Vol. 9, No. 1, 2009, pp. 82-94 Article Full Text PDF |
||
12. | Cryptanalysis of Two RFID Authentication Protocols
|
|
Tianjie Cao and Peng Shen, Vol. 9, No. 1, 2009, pp. 95-100 Article Full Text PDF |
||
13. | Subject index to volume 9 (2009)
|
|
Article Full Text PDF | ||
14. | Author index to volume 9 (2009)
|
|
Article Full Text PDF | ||
15. | Reviewer index to volume 9 (2009)
|
|
Article Full Text PDF | ||