International Journal of Security and Networks
2012 Vol.7 No.3
Pages | Title and author(s) |
133-147 | How to communicate anonymously in a network: study and optimisation of efficiency and security of anonymous communication networksKun Peng DOI: 10.1504/IJSN.2012.052525 |
148-160 | Jokestega: automatic joke generation-based steganography methodologyAbdelrahman Desoky DOI: 10.1504/IJSN.2012.052529 |
161-173 | A symmetric polynomial-based mutual authentication protocol for GSM networksAli Fanian; Mehdi Berenjkoub; T. Aaron Gulliver DOI: 10.1504/IJSN.2012.052530 |
174-180 | Cryptanalysis of an improved MFE public key cryptosystemZhaohu Xu; Xuyun Nie; Hui Wang; Yongjian Liao DOI: 10.1504/IJSN.2012.052532 |
181-193 | Towards an understanding of the impact of advertising on data leaksVeelasha Moonsamy; Moutaz Alazab; Lynn Batten DOI: 10.1504/IJSN.2012.052540 |