Journal: I. J. Network Security

Volume 3, Issue 3

203 -- 214Munirul M. Haque, Sheikh Iqbal Ahamed. Security in Pervasive Computing: Current Status and Open Issues
215 -- 224Wenling Wu, Wentao Zhang, Dongdai Lin. Security on Generalized Feistel Scheme with SP Round Function
225 -- 229Rama Murthy Garimella. Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach
230 -- 238Shijun Xiang, Jiwu Huang. Analysis of Quantization-based Audio Watermarking to D/A and A/D Conversions
239 -- 243Mustapha Hedabou. A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz
244 -- 258Bin Zhu, Ali A. Ghorbani. Alert Correlation for Extracting Attack Strategies
259 -- 270Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu. Authentication and Key Agreement Protocols Preserving Anonymity
271 -- 278Khin Mi Mi Aung, Kiejin Park, Jong Sou Park. Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration
279 -- 282Alberto Peinado Domínguez. Cryptanalysis of Park s Authentication Protocol in Wireless Mobile Communication Systems
283 -- 285Ren-Chiun Wang, Chou Chen Yang. Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards
286 -- 289Zuhua Shao. Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
290 -- 295Zhaohui Cheng, Richard Comley. Attacks on An ISO/IEC 11770-2 Key Establishment Protocol
296 -- 299Samuel S. Wagstaff Jr.. Is There a Shortage of Primes for Cryptography?

Volume 3, Issue 2

101 -- 115Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang. Password Authentication Schemes: Current Status and Key Issues
116 -- 119Bin Wang, Zheng-Quan Li. A Forward-Secure User Authentication Scheme with Smart Cards
120 -- 131Wassim Itani, Ayman I. Kayssi, Ali Chehab, Camille Gaspard. A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices
132 -- 137Sangook Moon. A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
138 -- 143Tianjie Cao, Dongdai Lin, Rui Xue. Security Analysis of Some Batch Verifying Signatures from Pairings
144 -- 150Sahadeo Padhye, Birendra Kumar Sharma. A Fast Semantically Secure Public Key Cryptosystem Based on Factoring
151 -- 154Eun-Jun Yoon, Kee-Young Yoo. On the Security of Signature Scheme with Message Recovery and Its Application
155 -- 159Fagen Li, Xiangjun Xin, Yupu Hu. ID-based Signcryption Scheme with (t, n) Shared Unsigncryption
160 -- 171Hamdy S. Soliman, Mohammed Omari. Application of Synchronous Dynamic Encryption System (SDES) in Wireless Sensor Networks
172 -- 190Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hartnett. Personality Trait Based Simulation Model of the E-mail System
191 -- 202Asad Amir Pirzada, Chris McDonald. Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks

Volume 3, Issue 1

1 -- 7Yan Zhang, Masayuki Fujise. Security Management in the Next Generation Wireless Networks
8 -- 17Liming Wang, Chuan-Kun Wu. Efficient Key Agreement for Large and Dynamic Multicast Groups
18 -- 22Qi Xie, Xiuyuan Yu. Cryptanalysis of Two Nonrepudiable Threshold Proxy Signature Schemes
23 -- 34Ratna Dutta, Rana Barua. Password-based Encrypted Group Key Agreement
35 -- 38Rongxing Lu, Zhenfu Cao. Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication
39 -- 43Jung-Wen Lo. The Improvement of YSYCT Scheme for Imbalanced Wireless Network
44 -- 50Dimitrios L. Delivasilis, Sokratis K. Katsikas. Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices
51 -- 53Eun-Jun Yoon, Kee-Young Yoo. A Forgery Attack on A Low Computation Cost User Authentication Scheme
54 -- 64Kenneth L. Calvert, Srinivasan Venkatraman, Jim Griffioen. Authenticated Access to Reserved Network Resources
65 -- 72Martin Stanek. Enforcing Policies in Content Manipulation Signature Schemes
73 -- 84Vishal Bhargava, Mihail L. Sichitiu. Physical Security Perimeters for Wireless Local Area Networks
85 -- 94Kim-Kwang Raymond Choo. On the Security of Lee, Kim, Kim, & Oh Key Agreement Protocol
95 -- 100Sunil Kumar Kashyap, Birendra Kumar Sharma, Amitabh Banerjee. A Cryptosystem Based on DLP gamma = alpha:::a:::beta:::b::: mod p