Journal: I. J. Network Security

Volume 10, Issue 3

161 -- 174Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, Balasubramaniam Srinivasan. Dynamic Key Cryptography and Applications
185 -- 187Moon K. Chetry, W. B. Vasantha Kandaswamy. A Note On Self-Shrinking Lagged Fibonacci Generator
188 -- 193Yong Zeng, Jianfeng Ma, Sang-Jae Moon. An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing
194 -- 200Benamar Kadri, Mohammed Feham, Abdallah M hamed. Lightweight PKI for WSN uPKI
201 -- 204Loránd Szöllösi, Tamás Marosits, Gábor Fehér. Accelerating RSA Encryption Using Random Precalculations
205 -- 209R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanagaraj, R. Chidambaram Kalimuthu, R. Dharmaraj. Secure Group Key Management Scheme for Multicast Networks
210 -- 215V. Umakanta Sastry, N. Ravi Shankar, S. Durga Bhavani. A Modified Hill Cipher Involving Interweaving and Iteration
216 -- 222Diaa Salama Abd Elminaam, Hatem Mohamed Abdual-Kader, Mohiy Mohamed Hadhoud. Evaluating The Performance of Symmetric Encryption Algorithms

Volume 10, Issue 2

81 -- 86Xiaozhuo Gu, Jianzu Yang. Design Universal Security Scheme for Broadband Router
87 -- 92S. Selvakani Kandeeban, Rengan S. Rajesh. Integrated Intrusion Detection System Using Soft Computing
93 -- 106Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris. Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
107 -- 113Rajaram Ramasamy, Amutha Prabakar Muniyandi. Computing the Modular Inverse of a Polynomial Function over GF(2:::P:::) Using Bit Wise Operation
114 -- 120Qiang Tang, Dongyao Ji. Verifiable Attribute Based Encryption
121 -- 124Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, Samuel S. Wagstaff Jr.. Provable Partial Key Escrow
125 -- 138Hongwei Li, Atam P. Dhawan. MOSAR: A Secured On-demand Routing Protocol for Mobile Multilevel Ad Hoc Networks
139 -- 152Ramanarayana Kandikattu, Lillykutty Jacob. Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
153 -- 157Tongjiang Yan. New Binary Sequences of Period ::::pq:::: with Low Values of Correlation and Large Linear Complexity
158 -- 160Zhiwei Wang, Licheng Wang, Yixian Yang, Zhengming Hu. Comment on Wu et al. s Server-aided Verification Signature Schemes

Volume 10, Issue 1

1 -- 10I-Shi Lee, Wen-Hsiang Tsai. Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code
11 -- 17Liam Wagner, Stuart McDonald. Finding Traitors in Secure Networks Using Byzantine Agreements
18 -- 24Adrian Mizzi. Return on Information Security Investment - The Viability Of An Anti-Spam Solution In A Wireless Environment
25 -- 31Chunxiang Gu, Yuefei Zhu. New Efficient Searchable Encryption Schemes from Bilinear Pairings
32 -- 38Narendra K. Pareek, Vinod Patidar, Krishan K. Sud. A Random Bit Generator Using Chaotic Maps
39 -- 50Malliga Subramanian, Tamilarasi Angamuthu. An Autonomous Framework for Early Detection of Spoofed Flooding Attacks
51 -- 56Mohsen Toorani, Ali Asghar Beheshti Shirazi. Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
62 -- 74Ahmad Almulhem, Issa Traoré. Detecting Connection-Chains: A Data Mining Approach
75 -- 80Hu Xiong, Zhiguang Qin, Fagen Li. Identity-based Threshold Signature Secure in the Standard Model