default search action
International Journal of Network Security, Volume 2
Volume 2, Number 1, January 2006
- Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang:
3G and WLAN Interworking Security: Current Status and Key. 1-13 - Nicolas Sklavos, Panagiotis Souras:
Economic Models & Approaches in Information Security for Computer Networks. 14-20 - Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Siu-Ming Yiu, Bruce S. N. Cheung:
Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience. 21-28 - Xiangguo Cheng, Lifeng Guo, Xinmei Wang:
An Identity-based Mediated Signature Scheme from Bilinear Pairing. 29-33 - Younho Lee, Heeyoul Kim, Seong-Min Hong, Hyunsoo Yoon:
Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains. 34-40 - Lars R. Knudsen:
Small Size Hashes with Enhanced Security. 41-42 - Eric Jui-Lin Lu, Cheng-Jian Huang:
A Time-stamping Proxy Signature Scheme Using Time-stamping Service. 43-51 - Arslan Broemme:
A Risk Analysis Approach for Biometric Authentication Technology. 52-63 - Kim-Kwang Raymond Choo:
Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol. 64-68 - Lifeng Guo, Yang Liu:
Security Analysis and Improvement of Hsu et al. Threshold Proxy Signature Scheme. 69-72 - Sahadeo Padhye:
Cryptanalysis of Koyama Scheme. 73-80
Volume 2, Number 2, March 2006
- Min-Shiang Hwang, Pei-Chen Sung:
A Study of Micro-payment Based on One-way Hash Chain. 81-90 - Deholo Nali, Ali Miri, Carlisle M. Adams:
Traffic Filtering and Routing in Partially-Hidden Networks. 91-104 - Heeyoul Kim, Younho Lee, Seong-Min Hong, Hyunsoo Yoon:
Active Trial-and-error Attack on SASC Protocols. 105-110 - Yu Long, Kefei Chen:
Construction of Dynamic Threshold Decryption Scheme from Pairing. 111-113 - Nikolay A. Moldovyan, Alexander A. Moldovyan, Michael A. Eremeev, Nicolas Sklavos:
New Class of Cryptographic Primitives and Cipher Design for Networks Security. 114-125 - Yong Ding, Kwok-Wo Wong, Yu-Min Wang:
Joint Sparse Form of Window Three for Koblitz Curve. 126-130 - Animesh Patcha, Jung-Min Park:
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks. 131-137 - Jolyon Clulow:
Cryptanalysis of the Secure Sessions from Weak Secrets Protocols. 138-140 - Adam J. Rocke, Ronald F. DeMara:
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling. 141-149 - Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao:
An Access Control System with Time-constraint Using Support Vector Machines. 150-159
Volume 2, Number 3, May 2006
- Jen-Bang Feng, Iuon-Chang Lin, Chwei-Shyong Tsai, Yen-Ping Chu:
Reversible Watermarking: Current Status and Key Issues. 161-170 - Huafei Zhu:
Setup-driving Verifiably Committed Signatures Within Standard Complexity Mode. 171-181 - Rongxing Lu, Zhenfu Cao:
A Directed Signature Scheme Based on RSA Assumption. 182-186 - Nikolay A. Moldovyan, Alexander A. Moldovyan, Michael A. Eremeev:
A Class of Data-Dependent Operations. 187-204 - Kumar V. Mangipudi, Rajendra S. Katti:
A Hash-based Strong Password Authentication Protocol with User Anonymity. 205-209 - Zhi Zhou, Kin Choong Yow:
Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy. 210-218 - Hsien-Chou Liao, Yi-Hsiang Wang:
A Memory Symptom-based Virus Detection Approach. 219-227 - Cungang Yang:
Secure Internet Applications Based on Mobile Agents. 228-237 - Josef Pieprzyk, Xian-Mo Zhang:
Ideal Secret Sharing Schemes from Permutations. 238-244
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.