
International Journal of Security and Networks
2017 Vol.12 No.2
Pages | Title and author(s) |
65-69 | The network software multistep control algorithm based on NNVD researchJunfeng Man; Cheng Peng; Yinghui Ma; Changyun Li DOI: 10.1504/IJSN.2017.10004573 |
70-82 | Stream cipher based key derivation functionChuah Chai Wen; Edward Dawson; Leonie Simpson DOI: 10.1504/IJSN.2017.10004574 |
83-102 | Survey of security issues in IPv4 to IPv6 tunnel transition mechanismsShubair A. Abdulla DOI: 10.1504/IJSN.2017.10004577 |
103-111 | Destination unaware geometric routing for delay tolerant networksZhiQiang Liu; Tong Wang; XiBo Wang DOI: 10.1504/IJSN.2017.10004581 |
112-119 | Finishing the tiny flows quickly for common data centre servicesXiaojun Deng; Tao Zhang; Xunyu He DOI: 10.1504/IJSN.2017.10004582 |
120-133 | Receipt-freeness and coercion resistance in remote E-voting systemsYefeng Ruan; Xukai Zou DOI: 10.1504/IJSN.2017.10004583 |