International Journal of Security and Networks
2017 Vol.12 No.2
Pages | Title and author(s) |
65-69 | The network software multistep control algorithm based on NNVD researchJunfeng Man; Cheng Peng; Yinghui Ma; Changyun Li DOI: 10.1504/IJSN.2017.083801 |
70-82 | Stream cipher based key derivation functionChuah Chai Wen; Edward Dawson; Leonie Simpson DOI: 10.1504/IJSN.2017.083813 |
83-102 | Survey of security issues in IPv4 to IPv6 tunnel transition mechanismsShubair A. Abdulla DOI: 10.1504/IJSN.2017.083830 |
103-111 | Destination unaware geometric routing for delay tolerant networksZhiQiang Liu; Tong Wang; XiBo Wang DOI: 10.1504/IJSN.2017.083833 |
112-119 | Finishing the tiny flows quickly for common data centre servicesXiaojun Deng; Tao Zhang; Xunyu He DOI: 10.1504/IJSN.2017.083834 |
120-133 | Receipt-freeness and coercion resistance in remote E-voting systemsYefeng Ruan; Xukai Zou DOI: 10.1504/IJSN.2017.083836 |