Stop the war!
Остановите войну!
for scientists:
default search action
International Journal of Network Security, Volume 9
Volume 9, Number 1, July 2009
- Tony Thomas:
Secure Two-party Protocols for Point Inclusion Problem. 1-7 - Kitae Kim, Ikkwon Yie, Seongan Lim:
Remark on Shao et al.'s Bidirectional Proxy Re-signature Scheme in Indocrypt'07. 8-11 - Jia Lun Tsai:
Efficient Nonce-based Authentication Scheme for Session Initiation Protocol. 12-16 - Fuw-Yi Yang:
Improvement on a Trapdoor Hash Function. 17-21 - Mohamed Salah Bouassida, Gilles Guette, Mohamed Shawky, Bertrand Ducourthial:
Sybil Nodes Detection Based on Received Signal Strength Variations within VANET. 22-33 - Jyh-Jian Sheu:
An Efficient Two-phase Spam Filtering Method Based on E-mails Categorization. 34-43 - Jorge Nakahara Jr.:
On the Order of Round Components in the AES. 44-50 - Maged Hamada Ibrahim:
Resisting Traitors in Linkable Democratic Group Signatures. 51-60 - Hristo Koshutanski:
A Survey on Distributed Access Control Systems for Web Business Processes. 61-69 - Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje:
Concurrency Control for Multilevel Secure Databases. 70-81 - M. Razvi Doomun, K. M. S. Soyjaudah:
Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security. 82-94 - Tianjie Cao, Peng Shen:
Cryptanalysis of Two RFID Authentication Protocols . 95-100
Volume 9, Number 2, September 2009
- Yoshito Kanamori, Seong-Moo Yoo, Don A. Gregory, Frederick T. Sheldon:
Authentication Protocol Using Quantum Superposition States. 101-108 - Jorge Nakahara Jr., Élcio Abrahão:
A New Involutory MDS Matrix for the AES. 109-116 - Tzu-Chun Lin:
Algorithms on Elliptic Curves over Fields of Characteristic Two with Non-adjacent Forms. 117-120 - Tim Landstra, Sarangapani Jagannathan, Maciej J. Zawodniok:
Energy-efficient Hybrid Key Management Protocol for Wireless Sensor Networks. 121-134 - Sunghyuck Hong:
Queue-based Group Key Agreement Protocol. 135-142 - Vincenzo Falletta, Fabio Ricciato:
Detecting Scanners: Empirical Assessment on a 3G Network. 143-155 - Cong Jin, Jun Liu, Qinghua Deng:
Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance. 156-163 - Günther Lackner, Udo Payer, Peter Teufl:
Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods. 164-172 - Thomas Chardin, Raphaël Marinier:
An Adaptive Chosen-plaintext Attack of the Improved Cellular Message Encryption Algorithm. 173-179 - Nikolay A. Moldovyan:
Acceleration of the Elliptic Cryptography with Vector Finite Fields. 180-185 - Jinu Kurian, Kamil Saraç:
Defending Network-based Services Against Denial of Service Attacks. 186-200
Volume 9, Number 3, November 2009
- Cheng-Chi Lee:
On Security of An Efficient Nonce-based Authentication Scheme for SIP. 201-203 - Moon-Chuen Lee, Yijun He, Zhaole Chen:
Towards Improving an Algebraic Marking Scheme for Tracing DDoS Attacks. 204-213 - Girraj Kumar Verma:
A Proxy Blind Signature Scheme over Braid Groups. 214-217 - R. Rajaram Ramasamy, M. Amutha Prabakar, M. Indra Devi, M. Suguna:
Knapsack Based ECC Encryption and Decryption. 218-226 - Chang-Kuo Yeh, Wei-Bin Lee:
An Overall Cost-effective Authentication Technique for the Global Mobility Network. 227-232 - Quoc-Cuong Le, Patrick Bellot:
How Can Quasi-trusted Nodes Help to Securely Relay QKD Keys?. 233-241 - Haibo Tian, Xiaofeng Chen, Yong Ding:
Analysis of Two Types Deniable Authentication Protocols. 242-246 - Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang:
Security and Trust in Digital Rights Management: A Survey. 247-263 - Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak:
Algorithms and Approaches of Proxy Signature: A Survey. 264-284 - Jorge Nakahara Jr.:
Analysis of Venkaiah et al.'s AES Design. 285-289 - Mohammad Reza Ahmadi:
An Intrusion Prediction Technique Based on Co-evolutionary Immune System for Network Security (CoCo-IDP) . 290-300
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.