Journal: I. J. Network Security

Volume 8, Issue 3

201 -- 210Jianping Zeng, Donghui Guo. Agent-based Intrusion Detection For Network-based Application
211 -- 220Danilo Gligoroski. On a Family of Minimal Candidate One-way Functions and One-way Permutations
221 -- 226Ali Bagherzandi, Mahmoud Salmasizadeh, Javad Mohajeri. A Related Key Attack on the Feistel Type Block Ciphers
227 -- 234Yu Long, Zheng Gong, Kefei Chen, Shengli Liu. Provably Secure Identity-based Threshold Key Escrow from Pairing
235 -- 242Hu Xiong, Zhiguang Qin, Fagen Li. An Anonymous Sealed-bid Electronic Auction Based on Ring Signature
243 -- 252Somanath Tripathy, Sukumar Nandi. LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption
253 -- 265Zein Radwan, Camille Gaspard, Ayman I. Kayssi, Ali Chehab. Policy-driven and Content-based Web Services Security Gateway
266 -- 270Chunbo Ma, Jun Ao. Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack
271 -- 281Chao Gong, Kamil Saraç. Toward a Practical Packet Marking Approach for IP Traceback
282 -- 292Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee. Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks
293 -- 300Danilo Gligoroski, Smile Markovski, Ljupco Kocarev. Edon-R, An Infinite Family of Cryptographic Hash Functions