Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijnsec/ijnsec10.bht:"
@article{DBLP:journals/ijnsec/AlmulhemT10, author = {Ahmad Almulhem and Issa Traor{\'{e}}}, title = {Detecting Connection-Chains: {A} Data Mining Approach}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {1}, pages = {62--74}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p62-74.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AlmulhemT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AzimianMSW10, author = {Kooshiar Azimian and Javad Mohajeri and Mahmoud Salmasizadeh and Samuel S. Wagstaff Jr.}, title = {Provable Partial Key Escrow}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {2}, pages = {121--124}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p121-124.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AzimianMSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChetryK10, author = {Moon K. Chetry and W. B. Vasantha Kandaswamy}, title = {A Note On Self-Shrinking Lagged Fibonacci Generator}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {3}, pages = {185--187}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p185-187.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChetryK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ElminaamKH10, author = {Diaa Salama Abd Elminaam and Hatem Mohamed Abdual{-}Kader and Mohiy Mohamed Hadhoud}, title = {Evaluating The Performance of Symmetric Encryption Algorithms}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {3}, pages = {216--222}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p216-222.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ElminaamKH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GuY10, author = {Xiaozhuo Gu and Jianzu Yang}, title = {Design Universal Security Scheme for Broadband Router}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {2}, pages = {81--86}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p81-86.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GuY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GuZ10, author = {Chunxiang Gu and Yuefei Zhu}, title = {New Efficient Searchable Encryption Schemes from Bilinear Pairings}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {1}, pages = {25--31}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p25-31.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GuZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KadriFM10, author = {Benamar Kadri and Mohammed Feham and Abdallah M'hamed}, title = {Lightweight {PKI} for {WSN} uPKI}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {3}, pages = {194--200}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p194-200.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KadriFM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KandeebanR10, author = {S. Selvakani Kandeeban and Rengan S. Rajesh}, title = {Integrated Intrusion Detection System Using Soft Computing}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {2}, pages = {87--92}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p87-92.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KandeebanR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KandikattuJ10, author = {Ramanarayana Kandikattu and Lillykutty Jacob}, title = {Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {2}, pages = {139--152}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p139-152.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KandikattuJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Kumar10, author = {Manoj Kumar}, title = {An Enhanced Remote User Authentication Scheme with Smart Card}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {3}, pages = {175--184}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p175-184.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Kumar10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LeeT10, author = {I{-}Shi Lee and Wen{-}Hsiang Tsai}, title = {Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible {ASCII} Control Code}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {1}, pages = {1--10}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p1-10.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LeeT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiD10, author = {Hongwei Li and Atam P. Dhawan}, title = {{MOSAR:} {A} Secured On-demand Routing Protocol for Mobile Multilevel Ad Hoc Networks}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {2}, pages = {125--138}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p125-138.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MitrokotsaKD10, author = {Aikaterini Mitrokotsa and Nikos Komninos and Christos Douligeris}, title = {Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {2}, pages = {93--106}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p93-106.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MitrokotsaKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Mizzi10, author = {Adrian Mizzi}, title = {Return on Information Security Investment - The Viability Of An Anti-Spam Solution In {A} Wireless Environment}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {1}, pages = {18--24}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p18-24.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Mizzi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/NgoWLWS10, author = {Huy Hoang Ngo and Xianping Wu and Phu Dung Le and Campbell Wilson and Balasubramaniam Srinivasan}, title = {Dynamic Key Cryptography and Applications}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {3}, pages = {161--174}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p161-174.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/NgoWLWS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/PareekPS10, author = {Narendra K. Pareek and Vinod Patidar and Krishan K. Sud}, title = {A Random Bit Generator Using Chaotic Maps}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {1}, pages = {32--38}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p32-38.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/PareekPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RamasamyM10, author = {Rajaram Ramasamy and Amutha Prabakar Muniyandi}, title = {Computing the Modular Inverse of a Polynomial Function over GF(2\({}^{\mbox{P}}\)) Using Bit Wise Operation}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {2}, pages = {107--113}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p107-113.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RamasamyM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SastrySB10, author = {V. Umakanta Sastry and N. Ravi Shankar and S. Durga Bhavani}, title = {A Modified Hill Cipher Involving Interweaving and Iteration}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {3}, pages = {210--215}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p210-215.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SastrySB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SrinivasanVRKKD10, author = {Rajavelu Srinivasan and Vaidehi V. and Rajavelu Rajaraman and S. Kanagaraj and R. Chidambaram Kalimuthu and R. Dharmaraj}, title = {Secure Group Key Management Scheme for Multicast Networks}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {3}, pages = {205--209}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p205-209.pdf}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/SrinivasanVRKKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SubramanianA10, author = {Malliga Subramanian and Tamilarasi Angamuthu}, title = {An Autonomous Framework for Early Detection of Spoofed Flooding Attacks}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {1}, pages = {39--50}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p39-50.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SubramanianA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SzollosiMF10, author = {Lor{\'{a}}nd Sz{\"{o}}ll{\"{o}}si and Tam{\'{a}}s Marosits and G{\'{a}}bor Feh{\'{e}}r}, title = {Accelerating {RSA} Encryption Using Random Precalculations}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {3}, pages = {201--204}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p201-204.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SzollosiMF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TangJ10, author = {Qiang Tang and Dongyao Ji}, title = {Verifiable Attribute Based Encryption}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {2}, pages = {114--120}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p114-120.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TangJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TooraniS10, author = {Mohsen Toorani and {Ali Asghar} {Beheshti Shirazi}}, title = {Cryptanalysis of an Elliptic Curve-based Signcryption Scheme}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {1}, pages = {51--56}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p51-56.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TooraniS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WagnerM10, author = {Liam Wagner and Stuart McDonald}, title = {Finding Traitors in Secure Networks Using Byzantine Agreements}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {1}, pages = {11--17}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p11-17.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WagnerM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangWYH10, author = {Zhiwei Wang and Licheng Wang and Yixian Yang and Zhengming Hu}, title = {Comment on Wu et al.'s Server-aided Verification Signature Schemes}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {2}, pages = {158--160}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p158-160.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangWYH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/XiongQL10, author = {Hu Xiong and Zhiguang Qin and Fagen Li}, title = {Identity-based Threshold Signature Secure in the Standard Model}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {1}, pages = {75--80}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p75-80.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/XiongQL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Yan10, author = {Tongjiang Yan}, title = {New Binary Sequences of Period \emph{pq} with Low Values of Correlation and Large Linear Complexity}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {2}, pages = {153--157}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p153-157.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Yan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/YongJM10, author = {Yong Zeng and Jianfeng Ma and Sang{-}Jae Moon}, title = {An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {3}, pages = {188--193}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p188-193.pdf}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/YongJM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Zhou10, author = {Jianqin Zhou}, title = {A Note on the Constructions of Orthomorphic Permutations}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {1}, pages = {57--61}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p57-61.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Zhou10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.