Search dblp for Publications

export results for "toc:db/journals/ijnsec/ijnsec13.bht:"

 download as .bib file

@article{DBLP:journals/ijnsec/Bouassida11,
  author       = {Mohamed Salah Bouassida},
  title        = {Authentication vs. Privacy within Vehicular Ad Hoc Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {121--134},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p121-134.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Bouassida11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenLCDH11,
  author       = {Chin{-}Ling Chen and
                  Yeong{-}Lin Lai and
                  Chih{-}Cheng Chen and
                  Yong{-}Yuan Deng and
                  Yu{-}Cheng Hwang},
  title        = {{RFID} Ownership Transfer Authorization Systems Conforming EPCglobal
                  Class-1 Generation-2 Standards},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {41--48},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n1/ijns-2011-v13-n1-p41-48.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChenLCDH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/DiamentLKY11,
  author       = {Ted Diament and
                  Homin K. Lee and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {The Efficient Dual Receiver Cryptosystem and Its Applications},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {135--151},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p135-151.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/DiamentLKY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GyongyosiI11,
  author       = {Laszlo Gyongyosi and
                  S{\'{a}}ndor Imre},
  title        = {Quantum Informational Divergence in Quantum Channel Security Analysis},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {1--12},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n1/ijns-2011-v13-n1-p1-12.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GyongyosiI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HeCH11,
  author       = {Debiao He and
                  Jianhua Chen and
                  Jin Hu},
  title        = {Weaknesses of a Remote User Password Authentication Scheme Using Smart
                  Card},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {58--60},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n1/ijns-2011-v13-n1-p58-60.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HeCH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/HuXHW11,
  author       = {Wei Hu and
                  Kaiping Xue and
                  Peilin Hong and
                  Chuchu Wu},
  title        = {{ATCS:} {A} Novel Anonymous and Traceable Communication Scheme for
                  Vehicular Ad Hoc Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {71--78},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n2/ijns-2011-v13-n2-p71-78.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/HuXHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KimYLN11,
  author       = {Kitae Kim and
                  Ikkwon Yie and
                  Seongan Lim and
                  Daehun Nyang},
  title        = {Batch Verification and Finding Invalid Signatures in a Group Signature
                  Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {61--70},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n2/ijns-2011-v13-n2-p61-70.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KimYLN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KumarGK11,
  author       = {Manoj Kumar and
                  Mridul Kumar Gupta and
                  Saru Kumari},
  title        = {An Improved Efficient Remote Password Authentication Scheme with Smart
                  Card over Insecure Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {167--177},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p167-177.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KumarGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiWY11,
  author       = {Celia Li and
                  Zhuang Wang and
                  Cungang Yang},
  title        = {Secure Routing for Wireless Mesh Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {109--120},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n2/ijns-2011-v13-n2-p109-120.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MalekzadehGSD11,
  author       = {Mina Malekzadeh and
                  Abdul Azim Abdul Ghani and
                  Shamala Subramaniam and
                  Jalil M. Desa},
  title        = {Validating Reliability of OMNeT++ in Wireless Networks DoS Attacks:
                  Simulation vs. Testbed},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {13--21},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n1/ijns-2011-v13-n1-p13-21.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MalekzadehGSD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Moldovyan11,
  author       = {Nikolay A. Moldovyan},
  title        = {Blind Signature Protocols from Digital Signature Standards},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {22--30},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n1/ijns-2011-v13-n1-p22-30.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Moldovyan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RajaramS11,
  author       = {Marimuthu Rajaram and
                  Thilagavathy Dorairaj Suresh},
  title        = {An Interval-based Contributory Key Agreement},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {92--97},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n2/ijns-2011-v13-n2-p92-97.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RajaramS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Rasslan11,
  author       = {Mohamed M. Nasreldin Rasslan},
  title        = {A Stamped Hidden-signature Scheme Utilizing The Elliptic Curve Discrete
                  Logarithm Problem},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {49--57},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n1/ijns-2011-v13-n1-p49-57.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Rasslan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SobhA11,
  author       = {Tarek S. Sobh and
                  Mohamed Ibrahiem Amer},
  title        = {{PGP} Modification for Securing Digital Envelope Mail Using {COM+}
                  and Web Services},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {79--91},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n2/ijns-2011-v13-n2-p79-91.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SobhA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SodiyaFOO11,
  author       = {Adesina S. Sodiya and
                  Olusegun Folorunso and
                  Saidat Adebukola Onashoga and
                  Omoniyi Paul Ogunderu},
  title        = {An Improved Semi-Global Alignment Algorithm for Masquerade Detection},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {31--40},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n1/ijns-2011-v13-n1-p31-40.pdf},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SodiyaFOO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SoodSS11,
  author       = {Sandeep K. Sood and
                  Anil Kumar Sarje and
                  Kuldip Singh},
  title        = {Inverse Cookie-based Virtual Password Authentication Protocol},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {98--108},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n2/ijns-2011-v13-n2-p98-108.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SoodSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/UdhayanH11,
  author       = {J. Udhayan and
                  T. Hamsapriya},
  title        = {Statistical Segregation Method to Minimize the False Detections During
                  DDoS Attacks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {152--160},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p152-160.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/UdhayanH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhaoZ11,
  author       = {Xingwen Zhao and
                  Fangguo Zhang},
  title        = {A New Type of ID-based Encryption System and Its Application to Pay-TV
                  Systems},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {161--166},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p161-166.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhaoZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhaoZ11a,
  author       = {Xingwen Zhao and
                  Fangguo Zhang},
  title        = {Analysis on Hu et al.'s Identity-based Broadcast Encryption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {178--180},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v13-n3/ijns-2011-v13-n3-p178-180.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhaoZ11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics