Journal: I. J. Network Security

Volume 15, Issue 2

71 -- 79Shih-Ting Hsu, Chou Chen Yang, Min-Shiang Hwang. A Study of Public Key Encryption with Keyword Search
80 -- 96Heba Kamal Aslan, Ghada F. ElKabbany. Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol
97 -- 105Mueen Uddin, Azizah Abdul Rahman, Naeem Uddin, Jamshed Memon, Raed A. Alsaqour, Suhail Kazi. Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents
106 -- 112G. Manikandan, M. Kamarasan, N. Sairam. A New Approach for Secure Data Transfer based on Wavelet Transform
113 -- 121B. Surekha, G. N. Swamy. Sensitive Digital Image Watermarking for Copyright Protection
122 -- 132Changsha Ma, Kaiping Xue, Peilin Hong. A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks
133 -- 138Mingwu Zhang, Jintao Yao, Chunzhi Wang, Tsuyoshi Takagi. Public Key Replacement and Universal Forgery of a SCLS Scheme
139 -- 147Chin-Chen Chang, Chia-Yin Lee. A Smart Card-based Authentication Scheme Using User Identify Cryptography
148 -- 150Kitae Kim, Hyung-Don Kim, Seungho Kim, Ikkwon Yie. Remarks on Zhang et al.'s Analysis on a Short Signature Scheme and Their Improvement