Journal: I. J. Network Security

Volume 12, Issue 1

1 -- 6Chunbo Ma, Jun Ao. Certificateless Group Oriented Signature Secure Against Key Replacement Attack
7 -- 12R. Rajaram Ramasamy, M. Amutha Prabakar. Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
13 -- 20Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elramly. New Real Time Multicast Authentication Protocol
21 -- 28Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury. Fault Attack, Countermeasures on Pairing Based Cryptography
29 -- 41Faisal Nabi. Designing a Secure Framework Method for Secure Business Application Logic Integrity in e-Commerce Systems
42 -- 49Peyman Kabiri, Mehran Aghaei. Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks
50 -- 57Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi. Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor
58 -- 60Chi-Yu Liu, Cheng-Chi Lee, Tzu-Chun Lin. Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme