International Journal of Security and Networks
Published issues
2007 Vol.2 No.3/4
International Journal of Security and Networks 2007 Vol.2 No.3/4 Special Issue on Cryptography in Networks
Guest Editors : Prof. Yi Mu, Dr. Liqun Chen, Prof. Xiaofeng Chen, Prof. Guang Gong, Dr. Phi Joong Lee, Dr. Atsuko Miyaji, Prof. Josef Pieprzyk, Dr. David Pointcheval, Prof. Tsuyoshi Takagi, Dr. Jacques Traore, Prof. Jennifer Seberry, Prof. Willy Susilo, Dr. Huaxiong Wang and Dr. Fangguo Zhang
Pages Title and author(s) 175-191 Efficient multicast stream authentication for the fully adversarial network model Christophe Tartary, Huaxiong WangDOI : 10.1504/IJSN.2007.013172 192-201 Aggregate designated verifier signatures and application to secure routing Raghav Bhaskar, Javier Herranz, Fabien LaguillaumieDOI : 10.1504/IJSN.2007.013173 202-215 LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network Hung-Yuan Hsu, Sencun Zhu, Ali R. HursonDOI : 10.1504/IJSN.2007.013174 216-227 On the design of secure protocols for hierarchical sensor networks Leonardo B. Oliveira, Hao Chi Wong, Antonio A.F. Loureiro, Ricardo DahabDOI : 10.1504/IJSN.2007.013175 228-238 Server side hashing core exceeding 3 Gbps of throughput Harris E. Michail, George A. Panagiotakopoulos, Vasilis N. Thanasoulis, Athanasios P. Kakarountas, Costas E. GoutisDOI : 10.1504/IJSN.2007.013176 239-250 Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks Katrin Hoeper, Guang GongDOI : 10.1504/IJSN.2007.013177 251-259 On security proof of McCullagh–Barreto's key agreement protocol and its variants Zhaohui Cheng, Liqun ChenDOI : 10.1504/IJSN.2007.013178 260-271 Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks Kevin M. Finnigin, Barry E. Mullins, Richard A. Raines, Henry B. PotocznyDOI : 10.1504/IJSN.2007.013179 272-283 Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks Dijiang HuangDOI : 10.1504/IJSN.2007.013180 284-296 Strong password-based authentication in TLS using the three-party group Diffie–Hellman protocol Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Moller, David PointchevalDOI : 10.1504/IJSN.2007.013181