Journal: I. J. Network Security

Volume 15, Issue 6

411 -- 419Min-Yu Chen, Chou Chen Yang, Min-Shiang Hwang. Privacy Protection Data Access Control
420 -- 436Günther Lackner. A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX
437 -- 445Naila Shakeel, Ghulam Murtaza, Nassar Ikram. MAYHAM - A New Hash Function
446 -- 454Hongbin Tang, Xinsong Liu, Lei Jiang. A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance
455 -- 464Atanu Basu, Indranil Sengupta, Jamuna Kanta Sing. Cryptosystem for Secret Sharing Scheme with Hierarchical Groups
465 -- 470Monjur Alam, Sonai Ray. Design of an Intelligent SHA-1 Based Cryptographic System: A CPSO Based Approach
471 -- 477Chin-Chen Chang, Jen-Ho Yang. A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies
478 -- 483Manjot Bhatia, Sunil Kumar Muttoo, M. P. S. Bhatia. Secure Requirement Prioritized Grid Scheduling Model
484 -- 489Huiyan Chen, Yong Li 0002, Jinping Ren. A Practical Identity-based Signcryption Scheme
490 -- 500Neeraj Kumar, Manoj Kumar, R. B. Patel. A Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks