International Journal of Security and Networks (IJSN)

International Journal of Security and Networks

2007 Vol.2 No.3/4

Special Issue on Cryptography in Networks

Guest Editors: Prof. Yi Mu, Dr. Liqun Chen, Prof. Xiaofeng Chen, Prof. Guang Gong, Dr. Phi Joong Lee, Dr. Atsuko Miyaji, Prof. Josef Pieprzyk, Dr. David Pointcheval, Prof. Tsuyoshi Takagi, Dr. Jacques Traore, Prof. Jennifer Seberry, Prof. Willy Susilo, Dr. Huaxiong Wang and Dr. Fangguo Zhang

Editorial

Pages Title and author(s)
175-191Efficient multicast stream authentication for the fully adversarial network model
Christophe Tartary, Huaxiong Wang
DOI: 10.1504/IJSN.2007.013172
192-201Aggregate designated verifier signatures and application to secure routing
Raghav Bhaskar, Javier Herranz, Fabien Laguillaumie
DOI: 10.1504/IJSN.2007.013173
202-215LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
Hung-Yuan Hsu, Sencun Zhu, Ali R. Hurson
DOI: 10.1504/IJSN.2007.013174
216-227On the design of secure protocols for hierarchical sensor networks
Leonardo B. Oliveira, Hao Chi Wong, Antonio A.F. Loureiro, Ricardo Dahab
DOI: 10.1504/IJSN.2007.013175
228-238Server side hashing core exceeding 3 Gbps of throughput
Harris E. Michail, George A. Panagiotakopoulos, Vasilis N. Thanasoulis, Athanasios P. Kakarountas, Costas E. Goutis
DOI: 10.1504/IJSN.2007.013176
239-250Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
Katrin Hoeper, Guang Gong
DOI: 10.1504/IJSN.2007.013177
251-259On security proof of McCullagh–Barreto's key agreement protocol and its variants
Zhaohui Cheng, Liqun Chen
DOI: 10.1504/IJSN.2007.013178
260-271Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
Kevin M. Finnigin, Barry E. Mullins, Richard A. Raines, Henry B. Potoczny
DOI: 10.1504/IJSN.2007.013179
272-283Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
Dijiang Huang
DOI: 10.1504/IJSN.2007.013180
284-296Strong password-based authentication in TLS using the three-party group Diffie–Hellman protocol
Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Moller, David Pointcheval
DOI: 10.1504/IJSN.2007.013181