Search dblp for Publications

export results for "toc:db/journals/ijnsec/ijnsec10.bht:"

 download as .bib file

@article{DBLP:journals/ijnsec/AlmulhemT10,
  author       = {Ahmad Almulhem and
                  Issa Traor{\'{e}}},
  title        = {Detecting Connection-Chains: {A} Data Mining Approach},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {62--74},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p62-74.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AlmulhemT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/AzimianMSW10,
  author       = {Kooshiar Azimian and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh and
                  Samuel S. Wagstaff Jr.},
  title        = {Provable Partial Key Escrow},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {121--124},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p121-124.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AzimianMSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChetryK10,
  author       = {Moon K. Chetry and
                  W. B. Vasantha Kandaswamy},
  title        = {A Note On Self-Shrinking Lagged Fibonacci Generator},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {185--187},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p185-187.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChetryK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ElminaamKH10,
  author       = {Diaa Salama Abd Elminaam and
                  Hatem Mohamed Abdual{-}Kader and
                  Mohiy Mohamed Hadhoud},
  title        = {Evaluating The Performance of Symmetric Encryption Algorithms},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {216--222},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p216-222.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ElminaamKH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GuY10,
  author       = {Xiaozhuo Gu and
                  Jianzu Yang},
  title        = {Design Universal Security Scheme for Broadband Router},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {81--86},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p81-86.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GuY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GuZ10,
  author       = {Chunxiang Gu and
                  Yuefei Zhu},
  title        = {New Efficient Searchable Encryption Schemes from Bilinear Pairings},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {25--31},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p25-31.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GuZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KadriFM10,
  author       = {Benamar Kadri and
                  Mohammed Feham and
                  Abdallah M'hamed},
  title        = {Lightweight {PKI} for {WSN} uPKI},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {194--200},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p194-200.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KadriFM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KandeebanR10,
  author       = {S. Selvakani Kandeeban and
                  Rengan S. Rajesh},
  title        = {Integrated Intrusion Detection System Using Soft Computing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {87--92},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p87-92.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KandeebanR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KandikattuJ10,
  author       = {Ramanarayana Kandikattu and
                  Lillykutty Jacob},
  title        = {Comparative Analysis of Different Cryptosystems for Hierarchical Mobile
                  IPv6-based Wireless Mesh Network},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {139--152},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p139-152.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KandikattuJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Kumar10,
  author       = {Manoj Kumar},
  title        = {An Enhanced Remote User Authentication Scheme with Smart Card},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {175--184},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p175-184.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Kumar10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LeeT10,
  author       = {I{-}Shi Lee and
                  Wen{-}Hsiang Tsai},
  title        = {Security Protection of Software Programs by Information Sharing and
                  Authentication Techniques Using Invisible {ASCII} Control Code},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {1--10},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p1-10.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LeeT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiD10,
  author       = {Hongwei Li and
                  Atam P. Dhawan},
  title        = {{MOSAR:} {A} Secured On-demand Routing Protocol for Mobile Multilevel
                  Ad Hoc Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {125--138},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p125-138.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MitrokotsaKD10,
  author       = {Aikaterini Mitrokotsa and
                  Nikos Komninos and
                  Christos Douligeris},
  title        = {Protection of an Intrusion Detection Engine with Watermarking in Ad
                  Hoc Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {93--106},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p93-106.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MitrokotsaKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Mizzi10,
  author       = {Adrian Mizzi},
  title        = {Return on Information Security Investment - The Viability Of An Anti-Spam
                  Solution In {A} Wireless Environment},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {18--24},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p18-24.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Mizzi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/NgoWLWS10,
  author       = {Huy Hoang Ngo and
                  Xianping Wu and
                  Phu Dung Le and
                  Campbell Wilson and
                  Balasubramaniam Srinivasan},
  title        = {Dynamic Key Cryptography and Applications},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {161--174},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p161-174.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/NgoWLWS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PareekPS10,
  author       = {Narendra K. Pareek and
                  Vinod Patidar and
                  Krishan K. Sud},
  title        = {A Random Bit Generator Using Chaotic Maps},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {32--38},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p32-38.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PareekPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RamasamyM10,
  author       = {Rajaram Ramasamy and
                  Amutha Prabakar Muniyandi},
  title        = {Computing the Modular Inverse of a Polynomial Function over GF(2\({}^{\mbox{P}}\))
                  Using Bit Wise Operation},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {107--113},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p107-113.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RamasamyM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SastrySB10,
  author       = {V. Umakanta Sastry and
                  N. Ravi Shankar and
                  S. Durga Bhavani},
  title        = {A Modified Hill Cipher Involving Interweaving and Iteration},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {210--215},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p210-215.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SastrySB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SrinivasanVRKKD10,
  author       = {Rajavelu Srinivasan and
                  Vaidehi V. and
                  Rajavelu Rajaraman and
                  S. Kanagaraj and
                  R. Chidambaram Kalimuthu and
                  R. Dharmaraj},
  title        = {Secure Group Key Management Scheme for Multicast Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {205--209},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p205-209.pdf},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SrinivasanVRKKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SubramanianA10,
  author       = {Malliga Subramanian and
                  Tamilarasi Angamuthu},
  title        = {An Autonomous Framework for Early Detection of Spoofed Flooding Attacks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {39--50},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p39-50.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SubramanianA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SzollosiMF10,
  author       = {Lor{\'{a}}nd Sz{\"{o}}ll{\"{o}}si and
                  Tam{\'{a}}s Marosits and
                  G{\'{a}}bor Feh{\'{e}}r},
  title        = {Accelerating {RSA} Encryption Using Random Precalculations},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {201--204},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p201-204.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SzollosiMF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TangJ10,
  author       = {Qiang Tang and
                  Dongyao Ji},
  title        = {Verifiable Attribute Based Encryption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {114--120},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p114-120.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TangJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TooraniS10,
  author       = {Mohsen Toorani and
                  {Ali Asghar} {Beheshti Shirazi}},
  title        = {Cryptanalysis of an Elliptic Curve-based Signcryption Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {51--56},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p51-56.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TooraniS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WagnerM10,
  author       = {Liam Wagner and
                  Stuart McDonald},
  title        = {Finding Traitors in Secure Networks Using Byzantine Agreements},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {11--17},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p11-17.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WagnerM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangWYH10,
  author       = {Zhiwei Wang and
                  Licheng Wang and
                  Yixian Yang and
                  Zhengming Hu},
  title        = {Comment on Wu et al.'s Server-aided Verification Signature Schemes},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {158--160},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p158-160.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangWYH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XiongQL10,
  author       = {Hu Xiong and
                  Zhiguang Qin and
                  Fagen Li},
  title        = {Identity-based Threshold Signature Secure in the Standard Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {75--80},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p75-80.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XiongQL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Yan10,
  author       = {Tongjiang Yan},
  title        = {New Binary Sequences of Period \emph{pq} with Low Values of Correlation
                  and Large Linear Complexity},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {153--157},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p153-157.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Yan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/YongJM10,
  author       = {Yong Zeng and
                  Jianfeng Ma and
                  Sang{-}Jae Moon},
  title        = {An Improvement on a Three-party Password-based Key Exchange Protocol
                  Using Weil Pairing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {188--193},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n3/ijns-2010-v10-n3-p188-193.pdf},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/YongJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Zhou10,
  author       = {Jianqin Zhou},
  title        = {A Note on the Constructions of Orthomorphic Permutations},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {57--61},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n1/ijns-2010-v10-n1-p57-61.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Zhou10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics