default search action
International Journal of Network Security, Volume 11
Volume 11, Number 1, July 2010
- Ismail Amr Ismail, Mohammed Amin, Hossam Diab:
A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps. 1-10 - V. Umakanta Sastry, N. Ravi Shankar, S. Durga Bhavani:
A Modified Hill Cipher Involving Interweaving and Iteration. 11-16 - Yong Zeng, Jianfeng Ma, Sang-Jae Moon:
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing. 17-22 - Rajendra S. Katti, Rajesh G. Kavasseri:
Nonce Generation For The Digital Signature Standard. 23-32 - Rajavelu Srinivasan, Vaidehi V., Rajavelu Rajaraman, S. Kanagaraj, R. Chidambaram Kalimuthu, R. Dharmaraj:
Secure Group Key Management Scheme for Multicast Networks. 33-38 - Fangwei Wang, Yunkai Zhang, Jianfeng Ma:
Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks. 39-45 - Nguyen Thanh Hoa, Kensuke Naoe, Yoshiyasu Takefuji:
Simplified IPSec Protocol Stack for Micro Server. 46-54 - Kou-Min Cheng, Ting Yi Chang, Jung-Wen Lo:
Cryptanalysis of Security Enhancement for a Modified Authenticated Key Agreement Protocol. 55-57 - Moon K. Chetry, W. B. Vasantha Kandaswamy:
A Note On Self-Shrinking Lagged Fibonacci Generator. 58-60
Volume 11, Number 2, September 2010
- Sunil V. K. Gaddam, Manohar Lal:
Efficient Cancelable Biometric Key Generation Scheme for Cryptography. 61-69 - Ding Yong, Yin-Fang Hong, Wei-Tao Wang, Yuan-Yuan Zhou, Xiao-Yang Zhao:
Speeding Scalar Multiplication of Elliptic Curve over GF(2mn). 70-77 - Diaa Salama Abdul Minaam, Hatem Mohamed Abdual-Kader, Mohiy Mohamed Hadhoud:
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types. 78-87 - Manoj Kumar:
A New Secure Remote User Authentication Scheme with Smart Cards. 88-93 - Chuen Chuan Huang, Chuen-Der Huang, Shin Ya Huang:
The Structure of a Signature via the Net. 94-105 - Nikolay A. Moldovyan, Alexander A. Moldovyan:
Blind Collective Signature Protocol Based on Discrete Logarithm Problem. 106-113 - Jie Liu, Jianhua Li:
A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol. 114-117 - Hemlal Sahu, Birendra Kumar Sharma:
An MSS Based on the Elliptic Curve Cryptosystem. 118-120
Volume 11, Number 3, November 2010
- Ramachandran Ganesan, Mohan Gobi, Kanniappan Vivekanandan:
A Novel Digital Envelope Approach for A Secure E-Commerce Channel. 121-127 - Yasser Kamal Hassan, Mohamed Hashim Abd El-Aziz, Ahmed Safwat Abd El-Radi:
Performance Evaluation of Mobility Speed over MANET Routing Protocols. 128-138 - Manpreet Singh, Manjeet Singh Patterh:
Formal Specification of Common Criteria Based Access Control Policy Model. 139-148 - Zhixiong Chen, Li Xu, Chenhuang Wu:
Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves. 149-154 - Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail:
Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves. 155-162 - Antonio San Martino, Xavier Perramon:
Phishing Secrets: History, Effects, Countermeasures. 163-171 - Addepalli V. N. Krishna, A. Vinaya Babu:
A New Model Based Encryption Mechanism With Time Stamp, Acknowledgement Support. 172-176 - Wei Zhao:
On the Security of Yuan et al.'s Undeniable Signature Scheme. 177-180
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.