


default search action
International Journal of Network Security, Volume 1
Volume 1, Number 1, July 2005
- Min-Shiang Hwang, Cheng-Chi Lee:

Research Issues and Challenges for Multiple Digital Signatures. 1-7 - Song-Kong Chong, Hsien-Chu Wu, Chia-Chun Wu:

A Scheme for Key Management on Alternate Temporal Key Hash. 8-13 - Ching-Wen Chen, Ming-Chin Chuang, Chwei-Shyong Tsai:

An Efficient Authentication Scheme between MANET and WLAN on IPv6 Based Internet. 14-23 - Zuhua Shao:

Improvement of Threshold Signature Using Self-certified Public Keys. 24-31 - Ching-Yung Liu:

A Lightweight Security Mechanism for ATM Networks. 32-37 - Cheng-Ying Yang, Cheng-Yeh Shiu:

A Secure Mobile IP Registration Protocol. 38-45 - Justin Zhijun Zhan, LiWu Chang, Stan Matwin:

Privacy Preserving K-nearest Neighbor Classification. 46-51 - Hussein Ahmad Al Hassan, Magdy Saeb, Hassan Desoky Hamed:

The PYRAMIDS Block Cipher. 52-60
Volume 1, Number 2, September 2005
- Min-Shiang Hwang, Chi-Yu Liu:

Authenticated Encryption Schemes: Current Status and Key Issues. 61-73 - Hsien-Chu Wu, Chi-Yu Liu, Shu-Fen Chiou:

Cryptanalysis of a Secure One-time Password Authentication Scheme with Low-communication for Mobile Communications. 74-76 - Minho Kim, Çetin Kaya Koç:

A Simple Attack on a Recently Introduced Hash-based Strong-password Authentication Scheme. 77-80 - Cheng-Ying Yang, Cheng-Chi Lee, Shu-Yin Hsiao:

Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object. 81-83 - Peyman Kabiri, Ali A. Ghorbani:

Research on Intrusion Detection and Response: A Survey. 84-102 - Nicolas Sklavos, Odysseas G. Koufopavlou:

Access Control in Networks Hierarchy: Implementation of Key Management Protocol. 103-109 - Muhammad J. Bohio, Ali Miri:

Self-healing Group Key Distribution. 110-117 - Jau-Ji Shen, Ching-Ying Lin, Hung-Wen Yang:

Cryptanalysis of a New Efficient MAKEP for Wireless Communications. 118-121
Volume 1, Number 3, November 2005
- Min-Shiang Hwang, Ting Yi Chang:

Threshold Signatures: Current Status and Key Issues. 123-137 - Zhuowei Li, Amitabha Das:

The Utility of Partial Knowledge in Behavior Models: An Evaluation for Intrusion Detection. 138-146 - Cheng-Chi Lee:

Two Attacks on the Wu-Hsu User Identification Scheme. 147-148 - Ronghua Li, Chuankun Wu:

Co-operative Private Equality Test. 149-153 - Kim-Kwang Raymond Choo:

Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols. 154-160 - Dave Singelée, Bart Preneel:

The Wireless Application Protocol. 161-165 - Amit K. Awasthi:

On the Authentication of the User from the Remote Autonomous Object. 166-167 - Xiaofeng Chen, Fangguo Zhang, Baodian Wei:

Comment on the Public Key Substitution Attacks. 168-172 - Deholo Nali, Carlisle M. Adams, Ali Miri:

Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control. 173-182

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














