Search dblp for Publications

export results for "toc:db/journals/ijnsec/ijnsec4.bht:"

 download as .bib file

@article{DBLP:journals/ijnsec/Abdel-HafezMO07,
  author       = {Ahmed Abdel{-}Hafez and
                  Ali Miri and
                  Luis Orozco{-}Barbosa},
  title        = {Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {90--98},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p90-98.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Abdel-HafezMO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AbrahamGM07,
  author       = {Ajith Abraham and
                  Crina Grosan and
                  Carlos Mart{\'{\i}}n{-}Vide},
  title        = {Evolutionary Design of Intrusion Detection Programs},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {328--339},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p328-339.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AbrahamGM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AhmedSA07,
  author       = {Shameem Ahmed and
                  Moushumi Sharmin and
                  Sheikh Iqbal Ahamed},
  title        = {{ETS} (Efficient, Transparent, and Secured) Self-healing Service for
                  Pervasive Computing Applications},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {271--281},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p271-281.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AhmedSA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AwasthiL07,
  author       = {Amit K. Awasthi and
                  Sunder Lal},
  title        = {ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear
                  Pairings},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {187--192},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p187-192.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AwasthiL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BianNKM07,
  author       = {Gaowei Bian and
                  Ken Nakayama and
                  Yoshitake Kobayashi and
                  Mamoru Maekawa},
  title        = {Java Bytecode Dependence Analysis for Secure Information Flow},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {59--68},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p59-68.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BianNKM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CacicW07,
  author       = {Brian J. Cacic and
                  Ruizhong Wei},
  title        = {Improving Indirect Key Management Scheme of Access Hierarchies},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {128--137},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p128-137.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CacicW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CaoM07,
  author       = {Tianjie Cao and
                  Xianping Mao},
  title        = {Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy
                  Signature Schemes},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {355--360},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p355-360.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CaoM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChangLLLY07,
  author       = {Lin{-}Huang Chang and
                  Che Lin Lo and
                  Jui Jen Lo and
                  Wei{-}Ting Liu and
                  Chou Chen Yang},
  title        = {Mobility Management with Distributed {AAA} Architecture},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {241--247},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p241-247.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChangLLLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CheccoBCNMZ07,
  author       = {Paolo Dal Checco and
                  Francesco Bergadano and
                  Davide Cavagnino and
                  Pasquale Andrea Nesta and
                  Michele Miraglia and
                  Pier Luigi Zaccone},
  title        = {Secure Logging for Irrefutable Administration},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {340--347},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p340-347.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CheccoBCNMZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/DasSP07,
  author       = {Manik Lal Das and
                  Ashutosh Saxena and
                  Deepak B. Phatak},
  title        = {Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {312--317},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p312-317.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/DasSP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Ding07,
  author       = {Ping Ding},
  title        = {Central Manager: {A} Solution to Avoid Denial Of Service Attacks for
                  Wireless LANs},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {35--44},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p35-44.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Ding07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GiriS07,
  author       = {Debasis Giri and
                  Parmeshwary Dayal Srivastava},
  title        = {An Asymmetric Cryptographic Key Assignment Scheme for Access Control
                  in Tree Structural Hierarchies},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {348--354},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p348-354.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GiriS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/IoannidisBIKAS07,
  author       = {Sotiris Ioannidis and
                  Steven M. Bellovin and
                  John Ioannidis and
                  Angelos D. Keromytis and
                  Kostas G. Anagnostakis and
                  Jonathan M. Smith},
  title        = {Virtual Private Services: Coordinated Policy Enforcement for Distributed
                  Applications},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {69--80},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p69-80.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/IoannidisBIKAS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/JiangLXL07,
  author       = {Zhonghua Jiang and
                  Dongdai Lin and
                  Lin Xu and
                  Lei Lin},
  title        = {Distributed Cryptographic Computing on Grid},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {179--186},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p179-186.pdf},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/JiangLXL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KarthikH07,
  author       = {Kannan Karthik and
                  Dimitrios Hatzinakos},
  title        = {Decryption Key Design for Joint Fingerprinting and Decryption in the
                  Sign Bit Plane for Multicast Content Protection},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {254--265},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p254-265.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KarthikH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KimK07,
  author       = {Minho Kim and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {235--239},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p235-239.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KimK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LeeKLHY07,
  author       = {Jaewon Lee and
                  Heeyoul Kim and
                  Younho Lee and
                  Seong{-}Min Hong and
                  Hyunsoo Yoon},
  title        = {Parallelized Scalar Multiplication on Elliptic Curves Defined over
                  Optimal Extension Field},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {99--106},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p99-106.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LeeKLHY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiW07,
  author       = {Jiguo Li and
                  Shuhong Wang},
  title        = {New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified
                  Public Key},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {193--200},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p193-200.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiZC07,
  author       = {Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen},
  title        = {LFSR-based Signatures with Message Recovery},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {266--270},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p266-270.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiaoJZQ07,
  author       = {Zhensong Liao and
                  Hai Jin and
                  Deqing Zou and
                  Weizhong Qiang},
  title        = {A Novel Approach to Hide Credentials},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {306--311},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p306-311.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiaoJZQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LinWW07,
  author       = {Pin Lin and
                  Wenling Wu and
                  Chuankun Wu},
  title        = {Security Analysis of Double Length Compression Function Based on Block
                  Cipher},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {121--127},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p121-127.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LinWW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LuCS07,
  author       = {Rongxing Lu and
                  Zhenfu Cao and
                  Jun Shao},
  title        = {On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature
                  Schemes with Shared Verification},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {248--253},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p248-253.pdf},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LuCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LuminiN07,
  author       = {Alessandra Lumini and
                  Loris Nanni},
  title        = {When Fingerprints Are Combined with Iris - {A} Case Study: {FVC2004}
                  and {CASIA}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {27--34},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p27-34.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LuminiN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MoldovyanMS07,
  author       = {Nikolay A. Moldovyan and
                  Peter A. Moldovyanu and
                  Douglas H. Summerville},
  title        = {On Software Implementation of Fast DDP-based Ciphers},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {81--89},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p81-89.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MoldovyanMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PalakaDPS07,
  author       = {Despoina Palaka and
                  Petros Daras and
                  Kosmas Petridis and
                  Michael G. Strintzis},
  title        = {A Novel Peer-to-peer Payment Protocol},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {107--120},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p107-120.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PalakaDPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Pan07,
  author       = {Leon Pan},
  title        = {A Web-based Multilayer Access Control Model for Multimedia Applications
                  in {MPEG-7}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {155--165},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p155-165.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Pan07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Ramkumar07,
  author       = {Mahalingam Ramkumar},
  title        = {Broadcast Authentication With Preferred Verifiers},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {166--178},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p166-178.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Ramkumar07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Ren07,
  author       = {Wei Ren},
  title        = {Pulsing RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {227--234},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p227-234.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Ren07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SaebHE07,
  author       = {Magdy Saeb and
                  Meer Hamza and
                  Ahmed El{-}Shikh},
  title        = {IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {212--226},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p212-226.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SaebHE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SusiloK07,
  author       = {Willy Susilo and
                  Hiroaki Kikuchi},
  title        = {Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem
                  without {A} Combiner},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {288--291},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p288-291.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SusiloK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ThorncharoensriXM07,
  author       = {Pairat Thorncharoensri and
                  Tianbing Xia and
                  Yi Mu},
  title        = {How to Find the Sufficient Collision Conditions for Haval-128 Pass
                  3 by Backward Analysis},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {138--148},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p138-148.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ThorncharoensriXM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TianZW07,
  author       = {Xiaojian Tian and
                  Robert W. Zhu and
                  Duncan S. Wong},
  title        = {Improved Efficient Remote User Authentication Schemes},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {149--154},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p149-154.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TianZW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangLW07,
  author       = {Dayin Wang and
                  Dongdai Lin and
                  Wenling Wu},
  title        = {Related-Mode Attacks on {CTR} Encryption Mode},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {282--287},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p282-287.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WuH07,
  author       = {Nan{-}I Wu and
                  Min{-}Shiang Hwang},
  title        = {Data Hiding: Current Status and Key Issues},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {1--9},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p1-9.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WuH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Yang07,
  author       = {Cungang Yang},
  title        = {Designing of {ORBAC} Model For Secure Domain Environments},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {10--16},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p10-16.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Yang07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhanM07,
  author       = {Justin Zhijun Zhan and
                  Stan Matwin},
  title        = {Privacy-Preserving Data Mining in Electronic Surveys},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {318--327},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p318-327.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhanM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangSS07,
  author       = {Zonghua Zhang and
                  Hong Shen and
                  Yingpeng Sang},
  title        = {An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion
                  Detection},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {292--305},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n3/ijns-2007-v4-n3-p292-305.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhongCC07,
  author       = {Shangping Zhong and
                  Xueqi Cheng and
                  Tierui Chen},
  title        = {Data Hiding in a Kind of {PDF} Texts for Secret Communication},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {17--26},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p17-26.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhongCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhuangTD07,
  author       = {Li Zhuang and
                  J. D. Tygar and
                  Rachna Dhamija},
  title        = {Injecting Heterogeneity Through Protocol Randomization},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {45--58},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n1/ijns-2007-v4-n1-p45-58.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhuangTD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZwierkoK07,
  author       = {Aneta Zwierko and
                  Zbigniew Kotulski},
  title        = {Integrity of mobile agents: a new approach},
  journal      = {Int. J. Netw. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {201--211},
  year         = {2007},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v4-n2/ijns-2007-v4-n2-p201-211.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZwierkoK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics