Journal: I. J. Network Security

Volume 6, Issue 3

241 -- 245Min-Ho Kim, Çetin Kaya Koç. Improving the Novikov and Kiselev User Authentication Scheme
246 -- 254Rui Jiang, Aiqun Hu, Jianhua Li. Formal Protocol Design of ESIKE Based on Authentication Tests
258 -- 264Pei-Yih Ting, Xiao-Wei Huang. Distributed Paillier Plaintext Equivalence Test
265 -- 269Tony Thomas, Arbind K. Lal. A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting
270 -- 281Depeng Li, Srinivas Sampalli. A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
282 -- 284Manik Lal Das. Comments on Improved Efficient Remote User Authentication Schemes
285 -- 290Wei-Bin Lee, Chang-Kuo Yeh. A Self-Concealing Mechanism for Authentication of Portable Communication Systems
291 -- 300Jing Li, Po Zhang, Srinivas Sampalli. Improved Security Mechanism for Mobile IPv6
301 -- 308Zaiqiang Liu, Dongdai Lin, Fengdeng Guo. A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine
309 -- 320Chin-Tser Huang, Sachin Thareja, Yong-June Shin. Wavelet-based Real Time Detection of Network Traffic Anomalies
321 -- 330Hao Luo, Binxing Fang, Xiao-chun Yun, Zhi-Gang Wu. An Effective Anomaly Detection Method in SMTP Traffic
331 -- 341Men Long, Chwan-Hwa Wu, J. David Irwin. Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
342 -- 353N. Nalini, G. Raghavendra Rao. Cryptanalysis of Block Ciphers via Improved Particle Swarm Optimisation and Extended Simulated Annealing Techniques
354 -- 360Ali Bagherzandi, Javad Mohajeri, Mahmoud Salmasizadeh. Comparison Based Semantic Security is Probabilistic Polynomial Time Equivalent to Indistinguishability

Volume 6, Issue 2

121 -- 126Xiangui Kang, Wenjun Zeng, Jiwu Huang. A Multi-band Wavelet Watermarking Scheme
127 -- 133Thian Song Ong, Andrew Teoh Beng Jin, David Chek Ling Ngo. Application-Specific Key Release Scheme from Biometrics
134 -- 144Ashok Kumar Das. An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks
145 -- 157Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Ali Chehab. LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
158 -- 169Christos Xenakis. Security Measures and Weaknesses of the GPRS Security Architecture
170 -- 180Joseph K. Liu, Duncan S. Wong. Solutions to Key Exposure Problem in Ring Signature
181 -- 184Atul Chaturvedi, Sunder Lal. An Authenticated Key Agreement Protocol Using Conjugacy Problem in Braid Groups
185 -- 189Fang-Ping Chiang, Yi-Mien Lin, Ya-Fen Chang. Comments on the Security Flaw of Hwang et al. s Blind Signature Scheme
190 -- 200Zine-Eddine Abid, Wei Wang. Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems
201 -- 210Yingwu Zhu, Yiming Hu. SurePath: An Approach to Resilient Anonymous Routing
211 -- 213Mohammed Misbahuddin, C. Shoba Bindu. Cryptanalysis of Liao-Lee-Hwang s Dynamic ID Scheme
214 -- 226Xiaolan Zhang 0003, Brian King. Security Requirements for RFID Computing Systems
227 -- 237Ali Aydin Selçuk, Ersin Uzun, Mark Resat Pariente. A Reputation-based Trust Management System for P2P Networks
238 -- 240Martin Stanek. Attacking LCCC Batch Verification of RSA Signatures

Volume 6, Issue 1

1 -- 5Chunxiang Xu, Junhui Zhou, Guozhen Xiao. General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
6 -- 14Francesco Palmieri. Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace
15 -- 25Qingyu Zhang, Kenneth L. Calvert. A Peer-based Recovery Scheme for Group Rekeying in Secure Multicast
26 -- 32Yijuan Shi, Jianhua Li, Jianjun Shi. Constructing Efficient Certificateless Public Key Encryption with Pairing
33 -- 39Yu Yu, Jussipekka Leiwo, Benjamin Premkumar. A Study on the Security of Privacy Homomorphism
40 -- 52Hwa Young Um, Edward J. Delp. A Secure Group Key Management Scheme for Wireless Cellular Systems
53 -- 59Marko Hassinen, Maija Marttila-Kontio, Mikko Saesmaa, Heli Tervo. Secure Two-Way Transfer of Measurement Data
60 -- 66Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh. Baseline Profile Stability for Network Anomaly Detection
67 -- 79Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor. Group Key Management in MANETs
80 -- 81Michal Sramka. Cryptanalysis of the Cryptosystem Based on DLP gamma = alpha:::a:::beta:::b:::
82 -- 93Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. Short Designated Verifier Signature Scheme and Its Identity-based Variant
94 -- 102Nithin Nagaraj, Vivek Vaidya, Prabhakar G. Vaidya. Re-visiting the One-Time Pad
103 -- 115Tarek S. Sobh, Ashraf Elgohary, Mohammed Zaki. Performance Improvements on the Network Level Security Protocols
116 -- 120Da-Zhi Sun, Zhen-Fu Cao. New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme