Journal: I. J. Network Security

Volume 4, Issue 3

241 -- 247Lin-Huang Chang, Che Lin Lo, Jui-jen Lo, Wei-Ting Liu, Chou Chen Yang. Mobility Management with Distributed AAA Architecture
248 -- 253Rongxing Lu, Zhenfu Cao, Jun Shao. On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification
254 -- 265Kannan Karthik, Dimitrios Hatzinakos. Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit Plane for Multicast Content Protection
266 -- 270Xiangxue Li, Dong Zheng, Kefei Chen. LFSR-based Signatures with Message Recovery
271 -- 281Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed. ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications
282 -- 287Dayin Wang, Dongdai Lin, Wenling Wu. Related-Mode Attacks on CTR Encryption Mode
288 -- 291Willy Susilo, Hiroaki Kikuchi. Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner
292 -- 305Zonghua Zhang, Hong Shen, Yingpeng Sang. An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
306 -- 311Zhensong Liao, Hai Jin, Deqing Zou, Weizhong Qiang. A Novel Approach to Hide Credentials
312 -- 317Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak. Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings
318 -- 327Justin Z. Zhan, Stan Matwin. Privacy-Preserving Data Mining in Electronic Surveys
328 -- 339Ajith Abraham, Crina Grosan, Carlos Martín-Vide. Evolutionary Design of Intrusion Detection Programs
340 -- 347Paolo Dal Checco, Francesco Bergadano, Davide Cavagnino, Pasquale Andrea Nesta, Michele Miraglia, Pier Luigi Zaccone. Secure Logging for Irrefutable Administration
348 -- 354Debasis Giri, Parmeshwary Dayal Srivastava. An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies
355 -- 360Tianjie Cao, Xianping Mao. Original Signer s Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes

Volume 4, Issue 2

121 -- 127Pin Lin, Wenling Wu, Chuankun Wu. Security Analysis of Double Length Compression Function Based on Block Cipher
128 -- 137Brian J. Cacic, Ruizhong Wei. Improving Indirect Key Management Scheme of Access Hierarchies
138 -- 148Pairat Thorncharoensri, Tianbing Xia, Yi Mu. How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis
149 -- 154Xiaojian Tian, Robert W. Zhu, Duncan S. Wong. Improved Efficient Remote User Authentication Schemes
155 -- 165Leon Pan. A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7
166 -- 178Mahalingam Ramkumar. Broadcast Authentication With Preferred Verifiers
179 -- 186Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin. Distributed Cryptographic Computing on Grid
187 -- 192Amit K. Awasthi, Sunder Lal. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
193 -- 200Jiguo Li, Shuhong Wang. New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key
201 -- 211Aneta Zwierko, Zbigniew Kotulski. Integrity of mobile agents: a new approach
212 -- 226Magdy Saeb, Meer Hamza, Ahmed El-Shikh. IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
227 -- 234Wei Ren. Pulsing RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks
235 -- 239Minho Kim, Çetin Kaya Koç. Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme

Volume 4, Issue 1

1 -- 9Nan-I Wu, Min-Shiang Hwang. Data Hiding: Current Status and Key Issues
10 -- 16Cungang Yang. Designing of ORBAC Model For Secure Domain Environments
17 -- 26Shangping Zhong, Xueqi Cheng, Tierui Chen. Data Hiding in a Kind of PDF Texts for Secret Communication
27 -- 34Alessandra Lumini, Loris Nanni. When Fingerprints Are Combined with Iris - A Case Study: FVC2004 and CASIA
35 -- 44Ping Ding. Central Manager: A Solution to Avoid Denial Of Service Attacks for Wireless LANs
45 -- 58Li Zhuang, J. D. Tygar, Rachna Dhamija. Injecting Heterogeneity Through Protocol Randomization
59 -- 68Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Mamoru Maekawa. Java Bytecode Dependence Analysis for Secure Information Flow
69 -- 80Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Kostas G. Anagnostakis, Jonathan M. Smith. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
81 -- 89Nikolay A. Moldovyan, Peter A. Moldovyanu, Douglas H. Summerville. On Software Implementation of Fast DDP-based Ciphers
90 -- 98Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa. Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
99 -- 106Jaewon Lee, Heeyoul Kim, YounHo Lee, Seong-Min Hong, Hyunsoo Yoon. Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field
107 -- 120Despoina Palaka, Petros Daras, Kosmas Petridis, Michael G. Strintzis. A Novel Peer-to-peer Payment Protocol