
International Journal of Security and Networks
2012 Vol.7 No.3
| Pages | Title and author(s) |
| 133-147 | How to communicate anonymously in a network: study and optimisation of efficiency and security of anonymous communication networksKun Peng DOI: 10.1504/IJSN.2012.052525 |
| 148-160 | Jokestega: automatic joke generation-based steganography methodologyAbdelrahman Desoky DOI: 10.1504/IJSN.2012.052529 |
| 161-173 | A symmetric polynomial-based mutual authentication protocol for GSM networksAli Fanian; Mehdi Berenjkoub; T. Aaron Gulliver DOI: 10.1504/IJSN.2012.052530 |
| 174-180 | Cryptanalysis of an improved MFE public key cryptosystemZhaohu Xu; Xuyun Nie; Hui Wang; Yongjian Liao DOI: 10.1504/IJSN.2012.052532 |
| 181-193 | Towards an understanding of the impact of advertising on data leaksVeelasha Moonsamy; Moutaz Alazab; Lynn Batten DOI: 10.1504/IJSN.2012.052540 |