default search action
International Journal of Network Security, Volume 3
Volume 3, Number 1, July 2006
- Yan Zhang, Masayuki Fujise:
Security Management in the Next Generation Wireless Networks. 1-7 - Liming Wang, Chuan-Kun Wu:
Efficient Key Agreement for Large and Dynamic Multicast Groups. 8-17 - Qi Xie, Xiuyuan Yu:
Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes. 18-22 - Ratna Dutta, Rana Barua:
Password-based Encrypted Group Key Agreement. 23-34 - Rongxing Lu, Zhenfu Cao:
Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication. 35-38 - Jung-Wen Lo:
The Improvement of YSYCT Scheme for Imbalanced Wireless Network. 39-43 - Dimitrios L. Delivasilis, Sokratis K. Katsikas:
Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices. 44-50 - Eun-Jun Yoon, Kee-Young Yoo:
A Forgery Attack on A Low Computation Cost User Authentication Scheme. 51-53 - Kenneth L. Calvert, Srinivasan Venkatraman, Jim Griffioen:
Authenticated Access to Reserved Network Resources. 54-64 - Martin Stanek:
Enforcing Policies in Content Manipulation Signature Schemes. 65-72 - Vishal Bhargava, Mihail L. Sichitiu:
Physical Security Perimeters for Wireless Local Area Networks. 73-84 - Kim-Kwang Raymond Choo:
On the Security of Lee, Kim, Kim, & Oh Key Agreement Protocol. 85-94 - Sunil Kumar Kashyap, Birendra Kumar Sharma, Amitabh Banerjee:
A Cryptosystem Based on DLP gamma = alphaabetab mod p. 95-100
Volume 3, Number 2, September 2006
- Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang:
Password Authentication Schemes: Current Status and Key Issues. 101-115 - Bin Wang, Zheng-Quan Li:
A Forward-Secure User Authentication Scheme with Smart Cards. 116-119 - Wassim Itani, Ayman I. Kayssi, Ali Chehab, Camille Gaspard:
A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices. 120-131 - Sangook Moon:
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems. 132-137 - Tianjie Cao, Dongdai Lin, Rui Xue:
Security Analysis of Some Batch Verifying Signatures from Pairings. 138-143 - Sahadeo Padhye, Birendra Kumar Sharma:
A Fast Semantically Secure Public Key Cryptosystem Based on Factoring. 144-150 - Eun-Jun Yoon, Kee-Young Yoo:
On the Security of Signature Scheme with Message Recovery and Its Application. 151-154 - Fagen Li, Xiangjun Xin, Yupu Hu:
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption. 155-159 - Hamdy S. Soliman, Mohammed Omari:
Application of Synchronous Dynamic Encryption System (SDES) in Wireless Sensor Networks. 160-171 - Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hartnett:
Personality Trait Based Simulation Model of the E-mail System. 172-190 - Asad Amir Pirzada, Chris McDonald:
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks. 191-202
Volume 3, Number 3, November 2006
- Munirul M. Haque, Sheikh Iqbal Ahamed:
Security in Pervasive Computing: Current Status and Open Issues. 203-214 - Wenling Wu, Wentao Zhang, Dongdai Lin:
Security on Generalized Feistel Scheme with SP Round Function. 215-224 - Rama Murthy Garimella:
Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach. 225-229 - Shijun Xiang, Jiwu Huang:
Analysis of Quantization-based Audio Watermarking to D/A and A/D Conversions. 230-238 - Mustapha Hedabou:
A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz. 239-243 - Bin Zhu, Ali A. Ghorbani:
Alert Correlation for Extracting Attack Strategies. 244-258 - Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu:
Authentication and Key Agreement Protocols Preserving Anonymity. 259-270 - Khin Mi Mi Aung, Kiejin Park, Jong Sou Park:
Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration. 271-278 - Alberto Peinado Domínguez:
Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems. 279-282 - Ren-Chiun Wang, Chou Chen Yang:
Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards. 283-285 - Zuhua Shao:
Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme. 286-289 - Zhaohui Cheng, Richard Comley:
Attacks on An ISO/IEC 11770-2 Key Establishment Protocol. 290-295 - Samuel S. Wagstaff Jr.:
Is There a Shortage of Primes for Cryptography? 296-299
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.