
International Journal of Security and Networks
2022 Vol.17 No.4
Pages | Title and author(s) |
231-239 | A provably secure signcryption with proxy re-encryption for smart water grid networkRachana Y. Patil; Yogesh H. Patil DOI: 10.1504/IJSN.2022.127151 |
240-246 | An efficient scalar multiplication algorithm on Koblitz curves using τ3-NAFPonnuru Surya Ganesh; R. Padmavathy; Anil Pinapati DOI: 10.1504/IJSN.2022.127152 |
247-268 | A literature review on security-aware design space exploration approaches for embedded systemsFateh Boutekkouk DOI: 10.1504/IJSN.2022.127153 |
269-283 | Network event-based model using finite state machine to detect and predict insider intrusion on enterprise networksT.N. Nisha; Dhanya Pramod DOI: 10.1504/IJSN.2022.127154 |
284-292 | Simulated study of the influence of node density on the performance of wireless sensor networksAaron Rasheed Rababaah DOI: 10.1504/IJSN.2022.127143 |