Journal: I. J. Network Security

Volume 10, Issue 2

81 -- 86Xiaozhuo Gu, Jianzu Yang. Design Universal Security Scheme for Broadband Router
87 -- 92S. Selvakani Kandeeban, Rengan S. Rajesh. Integrated Intrusion Detection System Using Soft Computing
93 -- 106Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris. Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
107 -- 113Rajaram Ramasamy, Amutha Prabakar Muniyandi. Computing the Modular Inverse of a Polynomial Function over GF(2:::P:::) Using Bit Wise Operation
114 -- 120Qiang Tang, Dongyao Ji. Verifiable Attribute Based Encryption
121 -- 124Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, Samuel S. Wagstaff Jr.. Provable Partial Key Escrow
125 -- 138Hongwei Li, Atam P. Dhawan. MOSAR: A Secured On-demand Routing Protocol for Mobile Multilevel Ad Hoc Networks
139 -- 152Ramanarayana Kandikattu, Lillykutty Jacob. Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
153 -- 157Tongjiang Yan. New Binary Sequences of Period ::::pq:::: with Low Values of Correlation and Large Linear Complexity
158 -- 160Zhiwei Wang, Licheng Wang, Yixian Yang, Zhengming Hu. Comment on Wu et al. s Server-aided Verification Signature Schemes