Pages | Title and author(s) |
2-12 | Workflow authorisation in mediator-free environmentsMohamed Shehab, Elisa Bertino, Arif Ghafoor DOI: 10.1504/IJSN.2006.010819 |
13-23 | Vulnerability analysis of certificate graphsEunjin (EJ) Jung, Mohamed G. Gouda DOI: 10.1504/IJSN.2006.010820 |
24-45 | Secure scalable group signature with dynamic joins and separable authoritiesAggelos Kiayias, Moti Yung DOI: 10.1504/IJSN.2006.010821 |
46-53 | A survey of key evolving cryptosystemsMatt Franklin DOI: 10.1504/IJSN.2006.010822 |
54-61 | A taxonomy of internet tracebackIhab Hamadeh, George Kesidis DOI: 10.1504/IJSN.2006.010823 |
62-74 | An approach to synthesise safe systemsArshad Jhumka, Felix Freiling, Christof Fetzer, Neeraj Suri DOI: 10.1504/IJSN.2006.010824 |
84-94 | Wireless networking security: open issues in trust, management, interoperation and measurementJoseph B. Evans, Weichao Wang, Benjamin J. Ewy DOI: 10.1504/IJSN.2006.010825 |
95-102 | Three ways to mount distinguishing attacks on irregularly clocked stream ciphersHakan Englund, Thomas Johansson DOI: 10.1504/IJSN.2006.010826 |
103-112 | Building trust in peer-to-peer systems: a reviewBo Zhu, Sushil Jajodia, Mohan S. Kankanhalli DOI: 10.1504/IJSN.2006.010827 |
113-124 | Secure collaborations over message boardsMahalingam Ramkumar, Nasir Memon DOI: 10.1504/IJSN.2006.010828 |