Journal: I. J. Network Security

Volume 12, Issue 3

121 -- 129Hussein Al-Bahadili, Shakir M. Hussain, Ghassan Issa, Khaled El-Zayyat. Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
130 -- 136Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, Tsuyoshi Takagi. Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings
137 -- 150S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari Bhat. Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
159 -- 170Eman El-Emam, Magdy Koutb, Hamdy M. Kelash, Osama S. Faragallah. An Authentication Protocol Based on Kerberos 5
171 -- 177Fuw-Yi Yang, Cai-Ming Liao. An Anonymous Auction Protocol Based on GDH Assumption
178 -- 180Shiang-Feng Tzeng, Cheng-Chi Lee, Tzu-Chun Lin. A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy