Journal: I. J. Network Security

Volume 12, Issue 3

121 -- 129Hussein Al-Bahadili, Shakir M. Hussain, Ghassan Issa, Khaled El-Zayyat. Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
130 -- 136Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, Tsuyoshi Takagi. Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings
137 -- 150S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari Bhat. Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
159 -- 170Eman El-Emam, Magdy Koutb, Hamdy M. Kelash, Osama S. Faragallah. An Authentication Protocol Based on Kerberos 5
171 -- 177Fuw-Yi Yang, Cai-Ming Liao. An Anonymous Auction Protocol Based on GDH Assumption
178 -- 180Shiang-Feng Tzeng, Cheng-Chi Lee, Tzu-Chun Lin. A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy

Volume 12, Issue 2

61 -- 74Imane Aly Saroit, Said Fathy El-Zoghdy, Mostafa Matar. A Scalable and Distributed Security Protocol for Multicast Communications
75 -- 83Mohammed Mana, Mohammed Feham, Boucif Amar Bensaber. Trust Key Management Scheme for Wireless Body Area Networks
84 -- 91Chinniah Porkodi, Ramalingam Arumuganathan, Krishnasamy Vidya. Multi-authority Electronic Voting Scheme Based on Elliptic Curves
92 -- 106Hu Xiong, Zhiguang Qin, Fagen Li. A Certificateless Proxy Ring Signature Scheme with Provable Security
107 -- 117Garth V. Crosby, Lance Hester, Niki Pissinou. Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
118 -- 120Girraj Kumar Verma. Probable Security Proof of A Blind Signature Scheme over Braid Groups

Volume 12, Issue 1

1 -- 6Chunbo Ma, Jun Ao. Certificateless Group Oriented Signature Secure Against Key Replacement Attack
7 -- 12R. Rajaram Ramasamy, M. Amutha Prabakar. Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
13 -- 20Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elramly. New Real Time Multicast Authentication Protocol
21 -- 28Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury. Fault Attack, Countermeasures on Pairing Based Cryptography
29 -- 41Faisal Nabi. Designing a Secure Framework Method for Secure Business Application Logic Integrity in e-Commerce Systems
42 -- 49Peyman Kabiri, Mehran Aghaei. Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks
50 -- 57Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi. Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor
58 -- 60Chi-Yu Liu, Cheng-Chi Lee, Tzu-Chun Lin. Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme