researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: I. J. Network Security
Home
Index
Info
Volume
Volume
1
, Issue
3
123
--
137
Min-Shiang Hwang
,
Ting Yi Chang
.
Threshold Signatures: Current Status and Key Issues
138
--
146
Zhuowei Li
,
Amitabha Das
.
The Utility of Partial Knowledge in Behavior Models: An Evaluation for Intrusion Detection
147
--
148
Cheng-Chi Lee
.
Two Attacks on the Wu-Hsu User Identification Scheme
149
--
153
Ronghua Li
,
Chuankun Wu
.
Co-operative Private Equality Test
154
--
160
Kim-Kwang Raymond Choo
.
Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols
161
--
165
Dave Singelée
,
Bart Preneel
.
The Wireless Application Protocol
168
--
172
Xiaofeng Chen
,
Fangguo Zhang
,
Baodian Wei
.
Comment on the Public Key Substitution Attacks
173
--
182
Deholo Nali
,
Carlisle M. Adams
,
Ali Miri
.
Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control
Volume
1
, Issue
2
61
--
73
Min-Shiang Hwang
,
Chi-Yu Liu
.
Authenticated Encryption Schemes: Current Status and Key Issues
74
--
76
Hsien-Chu Wu
,
Chi-Yu Liu
,
Shu-Fen Chiou
.
Cryptanalysis of a Secure One-time Password Authentication Scheme with Low-communication for Mobile Communications
77
--
80
Minho Kim
,
Çetin Kaya Koç
.
A Simple Attack on a Recently Introduced Hash-based Strong-password Authentication Scheme
81
--
83
Cheng-Ying Yang
,
Cheng-Chi Lee
,
Shu-Yin Hsiao
.
Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object
84
--
102
Peyman Kabiri
,
Ali A. Ghorbani
.
Research on Intrusion Detection and Response: A Survey
103
--
109
Nicolas Sklavos
,
Odysseas G. Koufopavlou
.
Access Control in Networks Hierarchy: Implementation of Key Management Protocol
110
--
117
Muhammad J. Bohio
,
Ali Miri
.
Self-healing Group Key Distribution
118
--
121
Jau-Ji Shen
,
Ching-Ying Lin
,
Hung-Wen Yang
.
Cryptanalysis of a New Efficient MAKEP for Wireless Communications
Volume
1
, Issue
1
1
--
7
Min-Shiang Hwang
,
Cheng-Chi Lee
.
Research Issues and Challenges for Multiple Digital Signatures
8
--
13
Song-Kong Chong
,
Hsien-Chu Wu
,
Chia Chun Wu
.
A Scheme for Key Management on Alternate Temporal Key Hash
14
--
23
Ching-Wen Chen
,
Ming-Chin Chuang
,
Chwei-Shyong Tsai
.
An Efficient Authentication Scheme between MANET and WLAN on IPv6 Based Internet
24
--
31
Zuhua Shao
.
Improvement of Threshold Signature Using Self-certified Public Keys
38
--
45
Cheng-Ying Yang
,
Cheng-Yeh Shiu
.
A Secure Mobile IP Registration Protocol
46
--
51
Justin Z. Zhan
,
LiWu Chang
,
Stan Matwin
.
Privacy Preserving K-nearest Neighbor Classification
52
--
60
Hussein Ahmad Al Hassan
,
Magdy Saeb
,
Hassan Desoky Hamed
.
The PYRAMIDS Block Cipher