Journal cover image

Browse issues


Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Security and Networks

2013 Vol. 8 No. 4

 

PagesTitle and authors
179-193On effective data aggregation techniques in host-based intrusion detection in MANET
Difan Zhang; Linqiang Ge; Wei Yu; Hanlin Zhang; Rommie L. Hardy; Robert J. Reschly
DOI: 10.1504/IJSN.2013.058152

194-199On the security of two improved authenticated encryption schemes
Mohamed Rasslan; Heba K. Aslan
DOI: 10.1504/IJSN.2013.058112

200-206Security analysis and improvement of two verifiable multi-secret sharing schemes
Jia Yu; Rong Hao; Xiangguo Cheng
DOI: 10.1504/IJSN.2013.058147

207-211A new proxy signature scheme with a semi-trusted third party based on elliptic curve discrete logarithm problem
Nedal Tahat
DOI: 10.1504/IJSN.2013.058113

212-230Runtime verification using policy-based approach to control information flow
Mohamed Sarrab
DOI: 10.1504/IJSN.2013.058153

231-238Pattern overlap in bit-parallel implementation of regular expression repetition quantifiers
Brendan Cronin; Xiaojun Wang
DOI: 10.1504/IJSN.2013.058154