Journal: I. J. Network Security

Volume 8, Issue 3

201 -- 210Jianping Zeng, Donghui Guo. Agent-based Intrusion Detection For Network-based Application
211 -- 220Danilo Gligoroski. On a Family of Minimal Candidate One-way Functions and One-way Permutations
221 -- 226Ali Bagherzandi, Mahmoud Salmasizadeh, Javad Mohajeri. A Related Key Attack on the Feistel Type Block Ciphers
227 -- 234Yu Long, Zheng Gong, Kefei Chen, Shengli Liu. Provably Secure Identity-based Threshold Key Escrow from Pairing
235 -- 242Hu Xiong, Zhiguang Qin, Fagen Li. An Anonymous Sealed-bid Electronic Auction Based on Ring Signature
243 -- 252Somanath Tripathy, Sukumar Nandi. LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption
253 -- 265Zein Radwan, Camille Gaspard, Ayman I. Kayssi, Ali Chehab. Policy-driven and Content-based Web Services Security Gateway
266 -- 270Chunbo Ma, Jun Ao. Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack
271 -- 281Chao Gong, Kamil Saraç. Toward a Practical Packet Marking Approach for IP Traceback
282 -- 292Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee. Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks
293 -- 300Danilo Gligoroski, Smile Markovski, Ljupco Kocarev. Edon-R, An Infinite Family of Cryptographic Hash Functions

Volume 8, Issue 2

101 -- 106Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang. Ordered Semiring-based Trust Establish Model with Risk Evaluating
107 -- 118Biju Issac. Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks
119 -- 124Fouz Sattar, Muid Mufti. On Post Decryption Error Pobability in Counter Mode Operation with Explicit Counter Transmittal
125 -- 130Yang Ming, YuMin Wang. An Efficient Verifiably Encrypted Signature Scheme without Random Oracles
131 -- 138Faisal Nabi. Virtual Invisible Disk Design for Information System Security
139 -- 150Maged Hamada Ibrahim. Efficient Dealer-Less Threshold Sharing of Standard RSA
151 -- 158Zhenfu Cao. Universal Encrypted Deniable Authentication Protocol
159 -- 165Maged Hamada Ibrahim. Receiver-deniable Public-Key Encryption
166 -- 168Chun-Ta Li, Yen-Ping Chu. Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks
169 -- 176Brian King. Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF(2^n)
177 -- 186Hasan Mohammed Hasan Husein, Bayoumi I. Bayoumi, Fathy Saad Holail, Bahaa Eldin M. Hasan, Mohammed Z. Abd El-Mageed. A Genetic Algorithm for Cryptanalysis with Application to DES-like Systems
187 -- 198Amjad Gawanmeh, Adel Bouhoula, Sofiène Tahar. Rank Functions Based Inference System for Group Key Management Protocols Verification
199 -- 200Jie Liu, Jianhua Li. Remarks on Zhang-Kim s Key Authentication Scheme

Volume 8, Issue 1

1 -- 9Maged Hamada Ibrahim. A Method for Obtaining Deniable Public-Key Encryption
10 -- 15Yuling Liu, Xingming Sun, Ingemar J. Cox, Hong Wang. Natural Language Information Hiding Based on Chinese Mathematical Expression
16 -- 24Yusuf Kurniawan, Adang Suwandi A., M. Sukrisno Mardiyanto, Iping Supriana, Sarwono Sutikno. The New Block Cipher: BC2
25 -- 30Gobindar S. Sandhu, Stevan M. Berber. Theoretical Model, Simulation Results and Performances of a Secure Chaos-based Multi-user Communication System
31 -- 36Andrew Blyth. An Architecture for An XML Enabled Firewall
37 -- 51Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin. Anonymity in Wireless Broadcast Networks
52 -- 58Xiaofeng Chen, Guomin Chen, Fangguo Zhang, Baodian Wei, Yi Mu. Identity-based Universal Designated Verifier Signature Proof System
59 -- 74B. Sathish Babu, Pallapa Venkataram. A Dynamic Authentication Scheme for Mobile Transactions
75 -- 89Mohamed M. Nasreldin Rasslan, Yasser H. Dakroury, Heba Kamal Aslan. A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach
90 -- 95Nikolay A. Moldovyan. Short Signatures from Difficulty of Factorization Problem
96 -- 100Changji Wang, Dongyang Long, Yong Tang. An Efficient Certificateless Signature from Pairings