Journal: I. J. Network Security

Volume 4, Issue 2

121 -- 127Pin Lin, Wenling Wu, Chuankun Wu. Security Analysis of Double Length Compression Function Based on Block Cipher
128 -- 137Brian J. Cacic, Ruizhong Wei. Improving Indirect Key Management Scheme of Access Hierarchies
138 -- 148Pairat Thorncharoensri, Tianbing Xia, Yi Mu. How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis
149 -- 154Xiaojian Tian, Robert W. Zhu, Duncan S. Wong. Improved Efficient Remote User Authentication Schemes
155 -- 165Leon Pan. A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7
166 -- 178Mahalingam Ramkumar. Broadcast Authentication With Preferred Verifiers
179 -- 186Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin. Distributed Cryptographic Computing on Grid
187 -- 192Amit K. Awasthi, Sunder Lal. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
193 -- 200Jiguo Li, Shuhong Wang. New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key
201 -- 211Aneta Zwierko, Zbigniew Kotulski. Integrity of mobile agents: a new approach
212 -- 226Magdy Saeb, Meer Hamza, Ahmed El-Shikh. IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
227 -- 234Wei Ren. Pulsing RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks
235 -- 239Minho Kim, Çetin Kaya Koç. Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme