International Journal of Security and Networks
2013 Vol.8 No.4
Pages | Title and author(s) |
179-193 | On effective data aggregation techniques in host-based intrusion detection in MANETDifan Zhang; Linqiang Ge; Wei Yu; Hanlin Zhang; Rommie L. Hardy; Robert J. Reschly DOI: 10.1504/IJSN.2013.058152 |
194-199 | On the security of two improved authenticated encryption schemesMohamed Rasslan; Heba K. Aslan DOI: 10.1504/IJSN.2013.058112 |
200-206 | Security analysis and improvement of two verifiable multi-secret sharing schemesJia Yu; Rong Hao; Xiangguo Cheng DOI: 10.1504/IJSN.2013.058147 |
207-211 | A new proxy signature scheme with a semi-trusted third party based on elliptic curve discrete logarithm problemNedal Tahat DOI: 10.1504/IJSN.2013.058113 |
212-230 | Runtime verification using policy-based approach to control information flowMohamed Sarrab DOI: 10.1504/IJSN.2013.058153 |
231-238 | Pattern overlap in bit-parallel implementation of regular expression repetition quantifiersBrendan Cronin; Xiaojun Wang DOI: 10.1504/IJSN.2013.058154 |