Journal: I. J. Network Security

Volume 9, Issue 3

201 -- 203Cheng-Chi Lee. On Security of An Efficient Nonce-based Authentication Scheme for SIP
204 -- 213Moon-Chuen Lee, Yijun He, Zhaole Chen. Towards Improving an Algebraic Marking Scheme for Tracing DDoS Attacks
214 -- 217Girraj Kumar Verma. A Proxy Blind Signature Scheme over Braid Groups
218 -- 226R. Rajaram Ramasamy, M. Amutha Prabakar, M. Indra Devi, M. Suguna. Knapsack Based ECC Encryption and Decryption
227 -- 232Chang-Kuo Yeh, Wei-Bin Lee. An Overall Cost-effective Authentication Technique for the Global Mobility Network
233 -- 241Quoc-Cuong Le, Patrick Bellot. How Can Quasi-trusted Nodes Help to Securely Relay QKD Keys?
242 -- 246Haibo Tian, Xiaofeng Chen, Yong Ding. Analysis of Two Types Deniable Authentication Protocols
247 -- 263Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang. Security and Trust in Digital Rights Management: A Survey
264 -- 284Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak. Algorithms and Approaches of Proxy Signature: A Survey
285 -- 289Jorge Nakahara Jr.. Analysis of Venkaiah et al. s AES Design
290 -- 300Mohammad Reza Ahmadi. An Intrusion Prediction Technique Based on Co-evolutionary Immune System for Network Security (CoCo-IDP)

Volume 9, Issue 2

101 -- 108Yoshito Kanamori, Seong-Moo Yoo, Don A. Gregory, Frederick T. Sheldon. Authentication Protocol Using Quantum Superposition States
109 -- 116Jorge Nakahara Jr., Élcio Abrahão. A New Involutory MDS Matrix for the AES
117 -- 120Tzu-Chun Lin. Algorithms on Elliptic Curves over Fields of Characteristic Two with Non-adjacent Forms
121 -- 134Tim Landstra, Sarangapani Jagannathan, Maciej J. Zawodniok. Energy-efficient Hybrid Key Management Protocol for Wireless Sensor Networks
135 -- 142Sunghyuck Hong. Queue-based Group Key Agreement Protocol
143 -- 155Vincenzo Falletta, Fabio Ricciato. Detecting Scanners: Empirical Assessment on a 3G Network
156 -- 163Cong Jin, Jun Liu, Qinghua Deng. Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance
164 -- 172Günther Lackner, Udo Payer, Peter Teufl. Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods
173 -- 179Thomas Chardin, Raphaël Marinier. An Adaptive Chosen-plaintext Attack of the Improved Cellular Message Encryption Algorithm
180 -- 185Nikolay A. Moldovyan. Acceleration of the Elliptic Cryptography with Vector Finite Fields
186 -- 200Jinu Kurian, Kamil Saraç. Defending Network-based Services Against Denial of Service Attacks

Volume 9, Issue 1

1 -- 7Tony Thomas. Secure Two-party Protocols for Point Inclusion Problem
8 -- 11Kitae Kim, Ikkwon Yie, Seongan Lim. Remark on Shao et al. s Bidirectional Proxy Re-signature Scheme in Indocrypt 07
17 -- 21Fuw-Yi Yang. Improvement on a Trapdoor Hash Function
22 -- 33Mohamed Salah Bouassida, Gilles Guette, Mohamed Shawky, Bertrand Ducourthial. Sybil Nodes Detection Based on Received Signal Strength Variations within VANET
34 -- 43Jyh-Jian Sheu. An Efficient Two-phase Spam Filtering Method Based on E-mails Categorization
44 -- 50Jorge Nakahara Jr.. On the Order of Round Components in the AES
51 -- 60Maged Hamada Ibrahim. Resisting Traitors in Linkable Democratic Group Signatures
61 -- 69Hristo Koshutanski. A Survey on Distributed Access Control Systems for Web Business Processes
70 -- 81Navdeep Kaur, Rajwinder Singh, Manoj Misra, A. K. Sarje. Concurrency Control for Multilevel Secure Databases
82 -- 94M. Razvi Doomun, K. M. S. Soyjaudah. Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security
95 -- 100Tianjie Cao, Peng Shen. Cryptanalysis of Two RFID Authentication Protocols