Journal: I. J. Network Security

Volume 1, Issue 3

123 -- 137Min-Shiang Hwang, Ting Yi Chang. Threshold Signatures: Current Status and Key Issues
138 -- 146Zhuowei Li, Amitabha Das. The Utility of Partial Knowledge in Behavior Models: An Evaluation for Intrusion Detection
147 -- 148Cheng-Chi Lee. Two Attacks on the Wu-Hsu User Identification Scheme
149 -- 153Ronghua Li, Chuankun Wu. Co-operative Private Equality Test
154 -- 160Kim-Kwang Raymond Choo. Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols
161 -- 165Dave Singelée, Bart Preneel. The Wireless Application Protocol
168 -- 172Xiaofeng Chen, Fangguo Zhang, Baodian Wei. Comment on the Public Key Substitution Attacks
173 -- 182Deholo Nali, Carlisle M. Adams, Ali Miri. Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control

Volume 1, Issue 2

61 -- 73Min-Shiang Hwang, Chi-Yu Liu. Authenticated Encryption Schemes: Current Status and Key Issues
74 -- 76Hsien-Chu Wu, Chi-Yu Liu, Shu-Fen Chiou. Cryptanalysis of a Secure One-time Password Authentication Scheme with Low-communication for Mobile Communications
77 -- 80Minho Kim, Çetin Kaya Koç. A Simple Attack on a Recently Introduced Hash-based Strong-password Authentication Scheme
81 -- 83Cheng-Ying Yang, Cheng-Chi Lee, Shu-Yin Hsiao. Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object
84 -- 102Peyman Kabiri, Ali A. Ghorbani. Research on Intrusion Detection and Response: A Survey
103 -- 109Nicolas Sklavos, Odysseas G. Koufopavlou. Access Control in Networks Hierarchy: Implementation of Key Management Protocol
110 -- 117Muhammad J. Bohio, Ali Miri. Self-healing Group Key Distribution
118 -- 121Jau-Ji Shen, Ching-Ying Lin, Hung-Wen Yang. Cryptanalysis of a New Efficient MAKEP for Wireless Communications

Volume 1, Issue 1

1 -- 7Min-Shiang Hwang, Cheng-Chi Lee. Research Issues and Challenges for Multiple Digital Signatures
8 -- 13Song-Kong Chong, Hsien-Chu Wu, Chia Chun Wu. A Scheme for Key Management on Alternate Temporal Key Hash
14 -- 23Ching-Wen Chen, Ming-Chin Chuang, Chwei-Shyong Tsai. An Efficient Authentication Scheme between MANET and WLAN on IPv6 Based Internet
24 -- 31Zuhua Shao. Improvement of Threshold Signature Using Self-certified Public Keys
38 -- 45Cheng-Ying Yang, Cheng-Yeh Shiu. A Secure Mobile IP Registration Protocol
46 -- 51Justin Z. Zhan, LiWu Chang, Stan Matwin. Privacy Preserving K-nearest Neighbor Classification
52 -- 60Hussein Ahmad Al Hassan, Magdy Saeb, Hassan Desoky Hamed. The PYRAMIDS Block Cipher