default search action
International Journal of Network Security, Volume 5
Volume 5, Number 1, July 2007
- Iosif-Viorel Onut, Ali A. Ghorbani:
A Feature Classification Scheme For Network Intrusion Detection. 1-15 - Dayin Wang, Dongdai Lin, Wenling Wu:
Another Look at PMAC. 16-20 - Adam J. Rocke, Ronald F. DeMara, Simon Foo:
Evaluation of Distributed File Integrity Analyzers in the Presence of Tampering. 21-31 - Tsz-Yeung Wong, John Chi-Shing Lui, Man Hon Wong:
Markov Chain Modelling of the Probabilistic Packet Marking Algorithm. 32-40 - Ashish Patel, M. Shah, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi:
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences. 41-50 - Bartlomiej Sieka, Ajay D. Kshemkalyani:
Establishing Authenticated Channels and Secure Identifiers in Ad-hoc Networks. 51-61 - Jianhong Zhang, Wei Zou:
On the Security of Huang-Chang Multi-signature Schemes. 62-65 - Peyman Kabiri, Ali A. Ghorbani:
A Rule-based Temporal Alert Correlation System. 66-72 - Yu Zhang, Li Lin, Jinpeng Huai:
Balancing Trust and Incentive in Peer-to-Peer Collaborative System. 73-81 - Rajavelu Srinivasan, Vaidehi V., K. N. Srivathsan, L. Ramesh Babu, C. Karunagaran:
SeReRoM: Secured Reliable Routing Scheme for Multicasting. 82-88 - Shi Cui, Pu Duan, Choong Wah Chan, Xiangguo Cheng:
An Efficient Identity-based Signature Scheme and Its Applications. 89-98 - Christos K. Dimitriadis, Siraj A. Shaikh:
A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions. 99-111 - Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi:
Statistical Attack Resilient Data Hiding. 112-120
Volume 5, Number 2, September 2007
- Yongliang Liu, Xiaolin Yang, Hongxun Yao, Wen Gao:
Novel Secure Communication Protocol for Conditional Access System. 121-127 - Ashraf D. Elbayoumy, Simon J. Shepherd:
Stream or Block Cipher for Securing VoIP? 128-133 - He Ge:
An Effective Method to Implement Group Signature with Revocation. 134-139 - Zhensong Liao, Yan Huang, Chisong Li:
Research on Data Hiding Capacity. 140-144 - Afrand Agah, Sajal K. Das:
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach. 145-153 - Dong Zheng, Xiangxue Li, Kefei Chen:
Code-based Ring Signature Scheme. 154-157 - Anil Rawat, Prakash Dattatraya Vyavahare, Ashwani Kumar Ramani:
Enhanced DSR for MANET with Improved Secured Route Discovery and QoS. 158-166 - Liam Keliher:
Toward Provable Security Against Differential and Linear Cryptanalysis for Camellia and Related Ciphers. 167-175 - Xiao-Ming Lu, Dengguo Feng:
Security Proof of the Original SOK-IBS Scheme. 176-181 - Bo Yang, Hua Ma, Shenglin Zhu:
A Traitor Tracing Scheme Based on the RSA System. 182-186 - Lirong Dai, Kendra M. L. Cooper:
A Survey of Modeling and Analysis Approaches for Architecting Secure Software Systems. 187-198 - Joseph K. Liu, Duncan S. Wong:
A More Efficient Instantiation of Witness-Indistinguishable Signature. 199-204 - Chetan Nanjunda Mathur, K. P. Subbalakshmi:
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices. 205-212 - Hasan Mohammed Hasan Husein, Bayoumi I. Bayoumi, Fathy Saad Holail, Bahaa Eldin M. Hasan, Mohammed Z. Abd El-Mageed:
A Genetic Algorithm for Cryptanalysis of DES-8. 213-219 - Zichen Li, C. F. Chong, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun:
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme. 220-223 - Arshad Aziz, Nassar Ikram:
An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture. 224-232 - Ashraf D. Elbayoumy, Simon J. Shepherd:
A Comprehensive Secure VoIP Solution. 233-240
Volume 5, Number 3, November 2007
- Nawal A. El-Fishawy, Osama M. Abu Zaid:
Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms. 241-251 - Yongwei Wang, Venkata C. Giruka, Mukesh Singhal:
A Truthful Geographic Forwarding Algorithm for Ad-hoc Networks with Selfish Nodes. 252-263 - Boldizsár Bencsáth, István Vajda:
Efficient Directory Harvest Attacks and Countermeasures. 264-273 - K. P. Subbalakshmi, Rajarathnam Chandramouli, Nagarajan Ranganathan:
A Sequential Distinguisher for Covert Channel Identification. 274-282 - Rongxing Lu, Zhenfu Cao:
Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings. 283-287 - Mohamed Layouni, Jozef Hooman, Sofiène Tahar:
Formal Specification and Verification of the Intrusion-Tolerant Enclaves Protocol. 288-298 - Carlos Ribeiro, Paulo Ferreira:
A Policy-Oriented Language for Expressing Security Specifications. 299-316 - Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Duffy:
A Biometric Identity Based Signature Scheme. 317-326 - Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu:
Elliptic Curve Cryptography Based Wireless Authentication Protocol. 327-337 - Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto:
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. 338-346 - Theodore Stergiou, Dimitrios L. Delivasilis:
Secure Error Signalling for Packet-Switched Networks - The Future Core Networks System Error Protocol. 347-358
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.