首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Network Security
ISSN Print: 1816-353X
ISSN Online:
主页:
http://ijns.femto.com.tw
分享:
Go
Detecting Connection-Chains: A Data Mining Approach
Ahmad Almulhem
,
Issa Traore
A Provably Secure and Efficient Strong Designated Verifier Signature Scheme
Fuw-Yi Yang
,
Cai-Ming Liao
Blind Collective Signature Protocol Based on Discrete Logarithm Problem
Nikolay A. Moldovyan
,
Alexander A. Moldovyan
A Note On Self-Shrinking Lagged Fibonacci Generator
Moon K. Chetry
,
W. B. Vasantha Kandaswamy
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
Aikaterini Mitrokotsa
,
Nikos Komninos
,
Christos Douligeris
Formal Specification of Common Criteria Based Access Control Policy Model
Manpreet Singh
,
Manjeet S. Patterh
Simplified IPSec Protocol Stack for Micro Server
Nguyen Thanh Hoa
,
Kensuke Naoe
,
Yoshiyasu Takefuji
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types
Diaa Salama Abdul Minaam
,
Hatem M. Abdual-Kader
,
Mohiy Mohamed Hadhoud
A New Secure Remote User Authentication Scheme with Smart Cards
Manoj Kumar
Cryptanalysis of Security Enhancement for a Modified Authenticated Key Agreement Protocol
Kou-Min Cheng
,
Ting-Yi Chang
,
Jung-Wen Lo
Comment on Wu et al.'s Server-aided Verification Signature Schemes
Zhiwei Wang
,
Licheng Wang
,
Yixian Yang
,
Zhengming Hu
Identity-based Threshold Signature Secure in the Standard Model
Hu Xiong
,
Zhiguang Qin
,
Fagen Li
An Efficient Verifiably Encrypted Signature Scheme without Random Oracles
Yang Ming
,
Yumin Wang
Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance
Cong Jin
,
Jun Liu
,
Qinghua Deng
Theoretical Model, Simulation Results and Performances of a Secure Chaos-based Multi-user Communication System
Gobindar S. Sandhu
,
Stevan Berber
On Post Decryption Error Pobability in Counter Mode Operation with Explicit Counter Transmittal
Fouz Sattar
,
Muid Mufti
Defending Network-based Services Against Denial of Service Attacks
Jinu Kurian
,
Kamil Sarac
Virtual Invisible Disk Design for Information System Security
Faisal Nabi
An Architecture for An XML Enabled Firewall
Andrew Blyth
How Can Quasi-trusted Nodes Help to Securely Relay QKD Keys?
Quoc-Cuong Le
,
Patrick Bellot
Security and Trust in Digital Rights Management: A Survey
Zhiyong Zhang
,
Qingqi Pei
,
Jianfeng Ma
,
Lin Yang
Acceleration of the Elliptic Cryptography with Vector Finite Fields
Nikolay A. Moldovyan
An Adaptive Chosen-plaintext Attack of the Improved Cellular Message Encryption Algorithm
Thomas Chardin
,
Rapha?l Marinier
Concurrency Control for Multilevel Secure Databases
Navdeep Kaur
,
Rajwinder Singh
,
Manoj Misra
,
A. K. Sarje
Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security
M. Razvi Doomun
,
KMS Soyjaudah
Algorithms and Approaches of Proxy Signature: A Survey
Manik Lal Das
,
Ashutosh Saxena
,
Deepak B Phatak
Analysis of Two Types Deniable Authentication Protocols
Haibo Tian
,
Xiaofeng Chen
,
Yong Ding
Combating Wireless LAN MAC-layer Address Spoofing with Fingerprinting Methods
Güenther Lackner
,
Udo Payer
,
Peter Teufl
Ordered Semiring-based Trust Establish Model with Risk Evaluating
Mingwu Zhang
,
Bo Yang
,
Shenglin Zhu
,
Wenzheng Zhang
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks
Biju Issac
A Survey on Distributed Access Control Systems for Web Business Processes
Hristo Koshutanski
The New Block Cipher: BC2
Yusuf Kurniawan
,
Adang Suwandi A.
,
M. Sukrisno Mardiyanto
,
Iping Supriana S.
Cryptanalysis of Two RFID Authentication Protocols
Tianjie Cao
,
Peng Shen
Anonymity in Wireless Broadcast Networks
Matt Blaze
,
John Ioannidis
,
Angelos D. Keromytis
,
Tal Malkin
Queue-based Group Key Agreement Protocol
Sunghyuck Hong
An Efficient Certificateless Signature from Pairings
Changji Wang
,
Dongyang Long
,
Yong Tang
Policy-driven and Content-based Web Services Security Gateway
Zein Radwan
,
Camille Gaspard
,
Ayman Kayssi
,
Ali Chehab
Receiver-deniable Public-Key Encryption
Maged Hamada Ibrahim
A Dynamic Authentication Scheme for Mobile Transactions
Sathish Babu B.
,
Pallapa Venkataram
An Anonymous Sealed-bid Electronic Auction Based on Ring Signature
Hu Xiong
,
Zhiguang Qin
,
Fagen Li
Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF(2^n)
Brian King
Toward a Practical Packet Marking Approach for IP Traceback
Chao Gong
,
Kamil Sarac
An Overall Cost-effective Authentication Technique for the Global Mobility Network
Chang-Kuo Yeh
,
Wei-Bin Lee
Short Signatures from Difficulty of Factorization Problem
Nikolay A. Moldovyan
Detecting Scanners: Empirical Assessment on a 3G Network
Vincenzo Falletta
,
Fabio Ricciato
Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks
Abedelaziz Mohaisen
,
DaeHun Nyang
,
KyungHee Lee
Analysis of Venkaiah et al.'s AES Design
Jorge Nakahara
Provably Secure Identity-based Threshold Key Escrow from Pairing
Yu Long
,
Zheng Gong
,
Kefei Chen
,
Shengli Liu
Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks
Chun-Ta Li
,
Yen-Ping Chu
A Genetic Algorithm for Cryptanalysis with Application to DES-like Systems
Hasan Mohammed Hasan Husei
,
Bayoumi I. Bayoumi
,
Fathy Saad Holail
,
Bahaa Eldin M. Hasan
Go