Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijnsec/ijnsec13.bht:"
@article{DBLP:journals/ijnsec/Bouassida11, author = {Mohamed Salah Bouassida}, title = {Authentication vs. Privacy within Vehicular Ad Hoc Networks}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {3}, pages = {121--134}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p121-134.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Bouassida11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChenLCDH11, author = {Chin{-}Ling Chen and Yeong{-}Lin Lai and Chih{-}Cheng Chen and Yong{-}Yuan Deng and Yu{-}Cheng Hwang}, title = {{RFID} Ownership Transfer Authorization Systems Conforming EPCglobal Class-1 Generation-2 Standards}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {1}, pages = {41--48}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n1/ijns-2011-v13-n1-p41-48.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChenLCDH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/DiamentLKY11, author = {Ted Diament and Homin K. Lee and Angelos D. Keromytis and Moti Yung}, title = {The Efficient Dual Receiver Cryptosystem and Its Applications}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {3}, pages = {135--151}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p135-151.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/DiamentLKY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GyongyosiI11, author = {Laszlo Gyongyosi and S{\'{a}}ndor Imre}, title = {Quantum Informational Divergence in Quantum Channel Security Analysis}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {1}, pages = {1--12}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n1/ijns-2011-v13-n1-p1-12.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GyongyosiI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HeCH11, author = {Debiao He and Jianhua Chen and Jin Hu}, title = {Weaknesses of a Remote User Password Authentication Scheme Using Smart Card}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {1}, pages = {58--60}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n1/ijns-2011-v13-n1-p58-60.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HeCH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/HuXHW11, author = {Wei Hu and Kaiping Xue and Peilin Hong and Chuchu Wu}, title = {{ATCS:} {A} Novel Anonymous and Traceable Communication Scheme for Vehicular Ad Hoc Networks}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {2}, pages = {71--78}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n2/ijns-2011-v13-n2-p71-78.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/HuXHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KimYLN11, author = {Kitae Kim and Ikkwon Yie and Seongan Lim and Daehun Nyang}, title = {Batch Verification and Finding Invalid Signatures in a Group Signature Scheme}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {2}, pages = {61--70}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n2/ijns-2011-v13-n2-p61-70.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KimYLN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KumarGK11, author = {Manoj Kumar and Mridul Kumar Gupta and Saru Kumari}, title = {An Improved Efficient Remote Password Authentication Scheme with Smart Card over Insecure Networks}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {3}, pages = {167--177}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p167-177.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KumarGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiWY11, author = {Celia Li and Zhuang Wang and Cungang Yang}, title = {Secure Routing for Wireless Mesh Networks}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {2}, pages = {109--120}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n2/ijns-2011-v13-n2-p109-120.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiWY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MalekzadehGSD11, author = {Mina Malekzadeh and Abdul Azim Abdul Ghani and Shamala Subramaniam and Jalil M. Desa}, title = {Validating Reliability of OMNeT++ in Wireless Networks DoS Attacks: Simulation vs. Testbed}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {1}, pages = {13--21}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n1/ijns-2011-v13-n1-p13-21.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MalekzadehGSD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Moldovyan11, author = {Nikolay A. Moldovyan}, title = {Blind Signature Protocols from Digital Signature Standards}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {1}, pages = {22--30}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n1/ijns-2011-v13-n1-p22-30.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Moldovyan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RajaramS11, author = {Marimuthu Rajaram and Thilagavathy Dorairaj Suresh}, title = {An Interval-based Contributory Key Agreement}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {2}, pages = {92--97}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n2/ijns-2011-v13-n2-p92-97.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RajaramS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/Rasslan11, author = {Mohamed M. Nasreldin Rasslan}, title = {A Stamped Hidden-signature Scheme Utilizing The Elliptic Curve Discrete Logarithm Problem}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {1}, pages = {49--57}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n1/ijns-2011-v13-n1-p49-57.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/Rasslan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SobhA11, author = {Tarek S. Sobh and Mohamed Ibrahiem Amer}, title = {{PGP} Modification for Securing Digital Envelope Mail Using {COM+} and Web Services}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {2}, pages = {79--91}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n2/ijns-2011-v13-n2-p79-91.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SobhA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SodiyaFOO11, author = {Adesina S. Sodiya and Olusegun Folorunso and Saidat Adebukola Onashoga and Omoniyi Paul Ogunderu}, title = {An Improved Semi-Global Alignment Algorithm for Masquerade Detection}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {1}, pages = {31--40}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n1/ijns-2011-v13-n1-p31-40.pdf}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SodiyaFOO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SoodSS11, author = {Sandeep K. Sood and Anil Kumar Sarje and Kuldip Singh}, title = {Inverse Cookie-based Virtual Password Authentication Protocol}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {2}, pages = {98--108}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n2/ijns-2011-v13-n2-p98-108.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SoodSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/UdhayanH11, author = {J. Udhayan and T. Hamsapriya}, title = {Statistical Segregation Method to Minimize the False Detections During DDoS Attacks}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {3}, pages = {152--160}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p152-160.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/UdhayanH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhaoZ11, author = {Xingwen Zhao and Fangguo Zhang}, title = {A New Type of ID-based Encryption System and Its Application to Pay-TV Systems}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {3}, pages = {161--166}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p161-166.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhaoZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhaoZ11a, author = {Xingwen Zhao and Fangguo Zhang}, title = {Analysis on Hu et al.'s Identity-based Broadcast Encryption}, journal = {Int. J. Netw. Secur.}, volume = {13}, number = {3}, pages = {178--180}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p178-180.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhaoZ11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.