Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             27 results found
no title author magazine year volume issue page(s) type
1 Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups Zhang, Leyou
2012
55 1-2 p. 12-18
7 p.
article
2 Advanced theory and practice for cryptography and future security Preneel, Bart
2012
55 1-2 p. 1-2
2 p.
article
3 A new construction of the server-aided verification signature scheme Wang, Zhiwei
2012
55 1-2 p. 97-101
5 p.
article
4 A new multistage approach to detect subtle DDoS attacks Wang, Fei
2012
55 1-2 p. 198-213
16 p.
article
5 A novel method for SQL injection attack detection based on removing SQL query attribute values Lee, Inyong
2012
55 1-2 p. 58-68
11 p.
article
6 A novel user authentication and privacy preserving scheme with smart cards for wireless communications Li, Chun-Ta
2012
55 1-2 p. 35-44
10 p.
article
7 A photographic forensic case study: Myths, principles and techniques Kim, Hyoung Joong
2012
55 1-2 p. 3-11
9 p.
article
8 A research on the investigation method of digital forensics for a VMware Workstation’s virtual machine Lim, Sungsu
2012
55 1-2 p. 151-160
10 p.
article
9 AS Alliance based security enhancement for inter-domain routing protocol Zhu, Peidong
2012
55 1-2 p. 241-255
15 p.
article
10 A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment Kim, Jangseong
2012
55 1-2 p. 45-57
13 p.
article
11 Authenticated public key broadcast encryption scheme secure against insiders’ attack Park, Chanil
2012
55 1-2 p. 113-122
10 p.
article
12 Authentication protocol using an identifier in an ad hoc network environment Moon, Jong Sik
2012
55 1-2 p. 134-141
8 p.
article
13 BLESS: Object level encryption security for object-based storage system Feng, Dan
2012
55 1-2 p. 188-197
10 p.
article
14 Differential fault analysis on block cipher SEED Jeong, Kitae
2012
55 1-2 p. 26-34
9 p.
article
15 Discrete logarithm problem using index calculus method Padmavathy, R.
2012
55 1-2 p. 161-169
9 p.
article
16 Editorial Board 2012
55 1-2 p. iii-iv
nvt p.
article
17 Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Mun, Hyeran
2012
55 1-2 p. 214-222
9 p.
article
18 Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography Vasyltsov, Ihor
2012
55 1-2 p. 256-267
12 p.
article
19 Improving performance of network covert timing channel through Huffman coding Wu, Jingzheng
2012
55 1-2 p. 69-79
11 p.
article
20 Mining constraints in role-based access control Ma, Xiaopu
2012
55 1-2 p. 87-96
10 p.
article
21 Modeling and quantitatively predicting software security based on stochastic Petri nets Yang, Nianhua
2012
55 1-2 p. 102-112
11 p.
article
22 On the number of rotation symmetric functions over G F ( p ) Fu, Shaojing
2012
55 1-2 p. 142-150
9 p.
article
23 On-the-spot digital investigation by means of LDFS: Live Data Forensic System Lim, Kyung-Soo
2012
55 1-2 p. 223-240
18 p.
article
24 On weaknesses of the HDCP authentication and key exchange protocol and its repair Zhao, Jianjie
2012
55 1-2 p. 19-25
7 p.
article
25 Related key chosen IV attacks on Decim v2 and Decim-128 Lin, Ding
2012
55 1-2 p. 123-133
11 p.
article
26 Securing mobile network prefix provisioning for NEMO based vehicular networks Lee, Jong-Hyouk
2012
55 1-2 p. 170-187
18 p.
article
27 Task-based behavior detection of illegal codes Han, Lansheng
2012
55 1-2 p. 80-86
7 p.
article
                             27 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands