Search dblp for Publications

export results for "toc:db/journals/ijnsec/ijnsec12.bht:"

 download as .bib file

@article{DBLP:journals/ijnsec/AbdellatifAE11,
  author       = {Riham Abdellatif and
                  Heba Kamal Aslan and
                  Salwa H. El{-}Ramly},
  title        = {New Real Time Multicast Authentication Protocol},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {13--20},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p13-20.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/AbdellatifAE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Al-BahadiliHIE11,
  author       = {Hussein Al{-}Bahadili and
                  Shakir M. Hussain and
                  Ghassan Issa and
                  Khaled El{-}Zayyat},
  title        = {Performance Evaluation of the {TSS} Node Authentication Scheme in
                  Noisy MANETs},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {121--129},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n3/ijns-2011-v12-n3-p121-129.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Al-BahadiliHIE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/CrosbyHP11,
  author       = {Garth V. Crosby and
                  Lance Hester and
                  Niki Pissinou},
  title        = {Location-aware, Trust-based Detection and Isolation of Compromised
                  Nodes in Wireless Sensor Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {107--117},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n2/ijns-2011-v12-n2-p107-117.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/CrosbyHP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/El-EmamKKF11,
  author       = {Eman El{-}Emam and
                  Magdy Koutb and
                  Hamdy M. Kelash and
                  Osama S. Faragallah},
  title        = {An Authentication Protocol Based on Kerberos 5},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {159--170},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n3/ijns-2011-v12-n3-p159-170.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/El-EmamKKF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GhoshMC11,
  author       = {Santosh Ghosh and
                  Debdeep Mukhopadhyay and
                  Dipanwita Roy Chowdhury},
  title        = {Fault Attack, Countermeasures on Pairing Based Cryptography},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {21--28},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p21-28.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GhoshMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KabiriA11,
  author       = {Peyman Kabiri and
                  Mehran Aghaei},
  title        = {Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {42--49},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p42-49.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KabiriA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuLL11,
  author       = {Chi{-}Yu Liu and
                  Cheng{-}Chi Lee and
                  Tzu{-}Chun Lin},
  title        = {Cryptanalysis of an Efficient Deniable Authentication Protocol Based
                  on Generalized ElGamal Signature Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {58--60},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p58-60.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiuLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MaA11,
  author       = {Chunbo Ma and
                  Jun Ao},
  title        = {Certificateless Group Oriented Signature Secure Against Key Replacement
                  Attack},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {1--6},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p1-6.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MaA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ManaFB11,
  author       = {Mohammed Mana and
                  Mohammed Feham and
                  Boucif Amar Bensaber},
  title        = {Trust Key Management Scheme for Wireless Body Area Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {75--83},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n2/ijns-2011-v12-n2-p75-83.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ManaFB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Nabi11,
  author       = {Faisal Nabi},
  title        = {Designing a Secure Framework Method for Secure Business Application
                  Logic Integrity in e-Commerce Systems},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {29--41},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p29-41.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Nabi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PorkodiAV11,
  author       = {Chinniah Porkodi and
                  Ramalingam Arumuganathan and
                  Krishnasamy Vidya},
  title        = {Multi-authority Electronic Voting Scheme Based on Elliptic Curves},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {84--91},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n2/ijns-2011-v12-n2-p84-91.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PorkodiAV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RamasamyP11,
  author       = {R. Rajaram Ramasamy and
                  M. Amutha Prabakar},
  title        = {Digital Signature Scheme with Message Recovery Using Knapsack-based
                  {ECC}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {7--12},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p7-12.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RamasamyP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Reddy11,
  author       = {Ekambaram Kesavulu Reddy},
  title        = {Elliptic Curve Cryptosystems and Side-channel Attacks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {151--158},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n3/ijns-2011-v12-n3-p151-158.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Reddy11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SaroitEM11,
  author       = {Imane Aly Saroit and
                  Said Fathy El{-}Zoghdy and
                  Mostafa Matar},
  title        = {A Scalable and Distributed Security Protocol for Multicast Communications},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {61--74},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n2/ijns-2011-v12-n2-p61-74.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SaroitEM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SathyanarayanaKB11,
  author       = {S. V. Sathyanarayana and
                  M. Aswatha Kumar and
                  K. N. Hari Bhat},
  title        = {Symmetric Key Image Encryption Scheme with Key Sequences Derived from
                  Random Sequence of Cyclic Elliptic Curve Points},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {137--150},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n3/ijns-2011-v12-n3-p137-150.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SathyanarayanaKB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TzengLL11,
  author       = {Shiang{-}Feng Tzeng and
                  Cheng{-}Chi Lee and
                  Tzu{-}Chun Lin},
  title        = {A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {178--180},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n3/ijns-2011-v12-n3-p178-180.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/TzengLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Verma11,
  author       = {Girraj Kumar Verma},
  title        = {Probable Security Proof of {A} Blind Signature Scheme over Braid Groups},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {118--120},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n2/ijns-2011-v12-n2-p118-120.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/Verma11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XiongQL11,
  author       = {Hu Xiong and
                  Zhiguang Qin and
                  Fagen Li},
  title        = {A Certificateless Proxy Ring Signature Scheme with Provable Security},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {92--106},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n2/ijns-2011-v12-n2-p92-106.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XiongQL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/YangL11,
  author       = {Fuw{-}Yi Yang and
                  Cai{-}Ming Liao},
  title        = {An Anonymous Auction Protocol Based on {GDH} Assumption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {171--177},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n3/ijns-2011-v12-n3-p171-177.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/YangL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangYZLT11,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Yusheng Zhong and
                  Pengcheng Li and
                  Tsuyoshi Takagi},
  title        = {Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle
                  from Bilinear Parings},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {130--136},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n3/ijns-2011-v12-n3-p130-136.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangYZLT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangYZT11,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Wenzheng Zhang and
                  Tsuyoshi Takagi},
  title        = {Multibiometric Based Secure Encryption, Authentication Scheme with
                  Fuzzy Extractor},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {50--57},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p50-57.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangYZT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics