default search action
International Journal of Network Security, Volume 1
Volume 1, Number 1, July 2005
- Min-Shiang Hwang, Cheng-Chi Lee:
Research Issues and Challenges for Multiple Digital Signatures. 1-7 - Song-Kong Chong, Hsien-Chu Wu, Chia-Chun Wu:
A Scheme for Key Management on Alternate Temporal Key Hash. 8-13 - Ching-Wen Chen, Ming-Chin Chuang, Chwei-Shyong Tsai:
An Efficient Authentication Scheme between MANET and WLAN on IPv6 Based Internet. 14-23 - Zuhua Shao:
Improvement of Threshold Signature Using Self-certified Public Keys. 24-31 - Ching-Yung Liu:
A Lightweight Security Mechanism for ATM Networks. 32-37 - Cheng-Ying Yang, Cheng-Yeh Shiu:
A Secure Mobile IP Registration Protocol. 38-45 - Justin Zhijun Zhan, LiWu Chang, Stan Matwin:
Privacy Preserving K-nearest Neighbor Classification. 46-51 - Hussein Ahmad Al Hassan, Magdy Saeb, Hassan Desoky Hamed:
The PYRAMIDS Block Cipher. 52-60
Volume 1, Number 2, September 2005
- Min-Shiang Hwang, Chi-Yu Liu:
Authenticated Encryption Schemes: Current Status and Key Issues. 61-73 - Hsien-Chu Wu, Chi-Yu Liu, Shu-Fen Chiou:
Cryptanalysis of a Secure One-time Password Authentication Scheme with Low-communication for Mobile Communications. 74-76 - Minho Kim, Çetin Kaya Koç:
A Simple Attack on a Recently Introduced Hash-based Strong-password Authentication Scheme. 77-80 - Cheng-Ying Yang, Cheng-Chi Lee, Shu-Yin Hsiao:
Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object. 81-83 - Peyman Kabiri, Ali A. Ghorbani:
Research on Intrusion Detection and Response: A Survey. 84-102 - Nicolas Sklavos, Odysseas G. Koufopavlou:
Access Control in Networks Hierarchy: Implementation of Key Management Protocol. 103-109 - Muhammad J. Bohio, Ali Miri:
Self-healing Group Key Distribution. 110-117 - Jau-Ji Shen, Ching-Ying Lin, Hung-Wen Yang:
Cryptanalysis of a New Efficient MAKEP for Wireless Communications. 118-121
Volume 1, Number 3, November 2005
- Min-Shiang Hwang, Ting Yi Chang:
Threshold Signatures: Current Status and Key Issues. 123-137 - Zhuowei Li, Amitabha Das:
The Utility of Partial Knowledge in Behavior Models: An Evaluation for Intrusion Detection. 138-146 - Cheng-Chi Lee:
Two Attacks on the Wu-Hsu User Identification Scheme. 147-148 - Ronghua Li, Chuankun Wu:
Co-operative Private Equality Test. 149-153 - Kim-Kwang Raymond Choo:
Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols. 154-160 - Dave Singelée, Bart Preneel:
The Wireless Application Protocol. 161-165 - Amit K. Awasthi:
On the Authentication of the User from the Remote Autonomous Object. 166-167 - Xiaofeng Chen, Fangguo Zhang, Baodian Wei:
Comment on the Public Key Substitution Attacks. 168-172 - Deholo Nali, Carlisle M. Adams, Ali Miri:
Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control. 173-182
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.