Journal: I. J. Network Security

Volume 11, Issue 3

121 -- 127Ramachandran Ganesan, Mohan Gobi, Kanniappan Vivekanandan. A Novel Digital Envelope Approach for A Secure E-Commerce Channel
128 -- 138Yasser Kamal Hassan, Mohamed Hashim Abd El-Aziz, Ahmed Safwat Abd El-Radi. Performance Evaluation of Mobility Speed over MANET Routing Protocols
139 -- 148Manpreet Singh, Manjeet S. Patterh. Formal Specification of Common Criteria Based Access Control Policy Model
149 -- 154Zhixiong Chen, Li Xu, Chenhuang Wu. Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves
155 -- 162Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail. Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves
163 -- 171Antonio San Martino, Xavier Perramon. Phishing Secrets: History, Effects, Countermeasures
172 -- 176Addepalli V. N. Krishna, A. Vinaya Babu. A New Model Based Encryption Mechanism With Time Stamp, Acknowledgement Support
177 -- 180Wei Zhao. On the Security of Yuan et al. s Undeniable Signature Scheme

Volume 11, Issue 2

61 -- 69Sunil V. K. Gaddam, Manohar Lal. Efficient Cancelable Biometric Key Generation Scheme for Cryptography
70 -- 77Ding Yong, Yin-fang Hong, Wei-tao Wang, Yuan-Yuan Zhou, Xiao-yang Zhao. Speeding Scalar Multiplication of Elliptic Curve over GF(2:::mn:::)
78 -- 87Diaa Salama Abdul Minaam, Hatem Mohamed Abdual-Kader, Mohiy Mohamed Hadhoud. Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
94 -- 105Chuen Chuan Huang, Chuen-Der Huang, Shin Ya Huang. The Structure of a Signature via the Net
106 -- 113Nikolay A. Moldovyan, Alexander A. Moldovyan. Blind Collective Signature Protocol Based on Discrete Logarithm Problem
114 -- 117Jie Liu, Jianhua Li. A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol
118 -- 120Hemlal Sahu, Birendra Kumar Sharma. An MSS Based on the Elliptic Curve Cryptosystem

Volume 11, Issue 1

1 -- 10Ismail Amr Ismail, Mohammed Amin, Hossam Diab. A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps
11 -- 16V. Umakanta Sastry, N. Ravi Shankar, S. Durga Bhavani. A Modified Hill Cipher Involving Interweaving and Iteration
17 -- 22Yong Zeng, Jianfeng Ma, Sang-Jae Moon. An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing
23 -- 32Rajendra S. Katti, Rajesh G. Kavasseri. Nonce Generation For The Digital Signature Standard
33 -- 38Rajavelu Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanagaraj, R. Chidambaram Kalimuthu, R. Dharmaraj. Secure Group Key Management Scheme for Multicast Networks
39 -- 45Fangwei Wang, Yunkai Zhang, Jianfeng Ma. Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks
46 -- 54Nguyen Thanh Hoa, Kensuke Naoe, Yoshiyasu Takefuji. Simplified IPSec Protocol Stack for Micro Server
55 -- 57Kou-Min Cheng, Ting Yi Chang, Jung-Wen Lo. Cryptanalysis of Security Enhancement for a Modified Authenticated Key Agreement Protocol
58 -- 60Moon K. Chetry, W. B. Vasantha Kandaswamy. A Note On Self-Shrinking Lagged Fibonacci Generator