首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
International Journal of Network Security
ISSN Print: 1816-353X
ISSN Online:
主页:
http://ijns.femto.com.tw
分享:
Go
Digital Signature Scheme with Message Recovery Using Knapsack-based ECC
R. Rajaram Ramasamy
,
M. Amutha Prabakar
Certificateless Group Oriented Signature Secure Against Key Replacement Attack
Chunbo Ma
,
Jun Ao
New Real Time Multicast Authentication Protocol
Riham Abdellatif
,
Heba Kamal Aslan
,
Salwa H. Elramly
Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks
Peyman Kabiri
,
Mehran Aghaei
Fault Attack and Countermeasures on Pairing Based Cryptography
Santosh Ghosh
,
Debdeep Mukhopadhyay
,
Dipanwita Roy Chowdhury
Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme
Chi-Yu Liu
,
Cheng-Chi Lee
,
Tzu-Chun Lin
Designing a Secure Framework Method for Secure Business Application Logic Integrity in e-Commerce Systems
Faisal Nabi
Multibiometric Based Secure Encryption and Authentication Scheme with Fuzzy Extractor
Mingwu Zhang
,
Bo Yang
,
Wenzheng Zhang
,
Tsuyoshi Takagi
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
Mohsen Toorani
,
Ali Asghar Beheshti Shirazi
Lightweight PKI for WSN uPKI
Benamar Kadri
,
Mohammed Feham
,
Abdallah M'hamed
Provable Partial Key Escrow
Kooshiar Azimian
,
Javad Mohajeri
,
Mahmoud Salmasizadeh
,
Samuel S. Wagstaff
,
Jr.
Verifiable Attribute Based Encryption
Qiang Tang
,
Dongyao Ji
Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves
Sameh M. Shohdy
,
Ashraf B. El-Sisi
,
Nabil Ismail
A Note on the Constructions of Orthomorphic Permutations
Jianqin Zhou
On the Security Cost of Interval Multicast
Weifeng Chen
,
Ye Sun
,
Anthony S. Pyzdrowski
Phishing Secrets: History, Effects, and Countermeasures
Antonio San Martino
,
Xavier Perramon
A New Model Based Encryption Mechanism With Time Stamp and Acknowledgement Support
A. V. N. Krishna
,
A. Vinaya Babu
A Random Bit Generator Using Chaotic Maps
Narendra K Pareek
,
Vinod Patidar
,
Krishan K Sud
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Ramanarayana Kandikattu
,
Lillykutty Jacob
MOSAR: A Secured On-demand Routing Protocol for Mobile Multilevel Ad Hoc Networks
Hongwei Li
,
Atam P. Dhawan
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing
Zeng Yong
,
Ma Jianfeng
,
Sangjae Moon
On the Security of Yuan et al.'s Undeniable Signature Scheme
Wei Zhao
A Modified Hill Cipher Involving Interweaving and Iteration
V. Umakanta Sastry
,
N. Ravi Shankar
,
S. Durga Bhavani
An Autonomous Framework for Early Detection of Spoofed Flooding Attacks
Malliga Subramanian
,
Tamilarasi Angamuthu
Nonce Generation For The Digital Signature Standard
Raj S. Katti
,
Rajesh G. Kavasseri
Efficient Cancelable Biometric Key Generation Scheme for Cryptography
Sunil V. K. Gaddam
,
Manohar Lal
Performance Evaluation of Mobility Speed over MANET Routing Protocols
Yasser Kamal Hassan
,
Mohamed Hashim Abd El-Aziz
,
Ahmed Safwat Abd El-Radi
Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks
Fangwei Wang
,
Yunkai Zhang
,
Jianfeng Ma
A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol
Jie Liu
,
Jianhua Li
LOTKIP: Low Overhead TKIP Optimization for Ad Hoc Wireless Networks
M. Razvi Doomun
,
K. M. Sunjiv Soyjaudah
Dynamic Key Cryptography and Applications
Huy Hoang Ngo
,
Xianping Wu
,
Phu Dung Le
,
Campbell Wilson
Integrated Intrusion Detection System Using Soft Computing
S Selvakani Kandeeban
,
Rengan S Rajesh
Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code
I-Shi Lee
,
Wen-Hsiang Tsai
Automatic Multi-step Attack Pattern Discovering
Li Wang
,
Ali Ghorbani
,
Yao Li
Secure Group Key Management Scheme for Multicast Networks
R. Srinivasan
,
V. Vaidehi
,
R. Rajaraman
,
S. Kanagaraj
Finding Traitors in Secure Networks Using Byzantine Agreements
Liam Wagner
,
Stuart McDonald
New Binary Sequences of Period pq with Low Values of Correlation and Large Linear Complexity
Tongjiang Yan
Computing the Modular Inverse of a Polynomial Function over GF(2^P) Using Bit Wise Operation
Rajaram Ramasamy
,
Amutha Prabakar Muniyandi
New Efficient Searchable Encryption Schemes from Bilinear Pairings
Chunxiang Gu
,
Yuefei Zhu
Evaluating The Performance of Symmetric Encryption Algorithms
Diaa Salama Abd Elminaam
,
Hatem Mohamed Abdual Kader
,
Mohiy Mohamed Hadhoud
A Novel Digital Envelope Approach for A Secure E-Commerce Channel
Ramachandran Ganesan
,
Mohan Gobi
,
Kanniappan Vivekanandan
Speeding Scalar Multiplication of Elliptic Curve over GF(2^mn)
Ding Yong
,
Yin-Fang Hong
,
Wei-Tao Wang
,
Yuan-Yuan Zhou
Return on Information Security Investment - The Viability Of An Anti-Spam Solution In A Wireless Environment
Adrian Mizzi
Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves
Zhixiong Chen
,
Li Xu
,
Chenhuang Wu
An MSS Based on the Elliptic Curve Cryptosystem
Hemlal Sahu
,
Birendra Kumar Sharma
Accelerating RSA Encryption Using Random Precalculations
Loránd Sz?ll?si
,
Tamás Marosits
,
Gábor Fehér
A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps
Ismail Amr Ismail
,
Mohammed Amin
,
Hossam Diab
An Enhanced Remote User Authentication Scheme with Smart Card
Manoj Kumar
The Structure of a Signature via the Net
Chuen Chuan Huang
,
Chuen-Der Huang
,
Shin Ya Huang
Design Universal Security Scheme for Broadband Router
Xiaozhuo Gu
,
Jianzu Yang
Go