Journal: I. J. Network Security

Volume 15, Issue 1

1 -- 8Quan Qian, Chao-Jie Xiao, Rui Zhang 0013. Grid-based Data Stream Clustering for Intrusion Detection
9 -- 15Kakali Chatterjee, Asok De, Daya Gupta. Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices
16 -- 22Quan Qian, Tianhong Wang, Rui Zhang 0013. Relative Network Entropy based Clustering Algorithm for Intrusion Detection
23 -- 27G. A. V. Rama Chandra Rao, P. V. Lakshmi, N. Ravi Shankar. A New Modular Multiplication Method in Public Key Cryptosystem
28 -- 41Xiuxia Tian, Xiaoling Wang, Aoying Zhou. DSP Re-encryption Based Access Control Enforcement Management Mechanism in DaaS
42 -- 49Benamar Kadri, Djilalli Moussaoui, Mohammed Feham. A PKI over Ant Colony based Routing Algorithms for MANETs -AntPKI-
50 -- 58Mehran Asadi, Christopher Zimmerman, Afrand Agah. A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks
59 -- 63Jianqin Zhou, Wei Xiong. An Algorithm for Computing m-Tight Error Linear Complexity of Sequences over GF(p^m) with Period p^m
64 -- 67Cheng-Chi Lee, Chia-Hsin Liu, Min-Shiang Hwang. Guessing Attacks on Strong-Password Authentication Protocol
68 -- 70Abdel Alim Kamal. Cryptanalysis of a Polynomial-based Key Management Scheme for Secure Group Communication