no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
|
Zhang, Leyou |
|
2012 |
55 |
1-2 |
p. 12-18 7 p. |
article |
2 |
Advanced theory and practice for cryptography and future security
|
Preneel, Bart |
|
2012 |
55 |
1-2 |
p. 1-2 2 p. |
article |
3 |
A new construction of the server-aided verification signature scheme
|
Wang, Zhiwei |
|
2012 |
55 |
1-2 |
p. 97-101 5 p. |
article |
4 |
A new multistage approach to detect subtle DDoS attacks
|
Wang, Fei |
|
2012 |
55 |
1-2 |
p. 198-213 16 p. |
article |
5 |
A novel method for SQL injection attack detection based on removing SQL query attribute values
|
Lee, Inyong |
|
2012 |
55 |
1-2 |
p. 58-68 11 p. |
article |
6 |
A novel user authentication and privacy preserving scheme with smart cards for wireless communications
|
Li, Chun-Ta |
|
2012 |
55 |
1-2 |
p. 35-44 10 p. |
article |
7 |
A photographic forensic case study: Myths, principles and techniques
|
Kim, Hyoung Joong |
|
2012 |
55 |
1-2 |
p. 3-11 9 p. |
article |
8 |
A research on the investigation method of digital forensics for a VMware Workstation’s virtual machine
|
Lim, Sungsu |
|
2012 |
55 |
1-2 |
p. 151-160 10 p. |
article |
9 |
AS Alliance based security enhancement for inter-domain routing protocol
|
Zhu, Peidong |
|
2012 |
55 |
1-2 |
p. 241-255 15 p. |
article |
10 |
A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment
|
Kim, Jangseong |
|
2012 |
55 |
1-2 |
p. 45-57 13 p. |
article |
11 |
Authenticated public key broadcast encryption scheme secure against insiders’ attack
|
Park, Chanil |
|
2012 |
55 |
1-2 |
p. 113-122 10 p. |
article |
12 |
Authentication protocol using an identifier in an ad hoc network environment
|
Moon, Jong Sik |
|
2012 |
55 |
1-2 |
p. 134-141 8 p. |
article |
13 |
BLESS: Object level encryption security for object-based storage system
|
Feng, Dan |
|
2012 |
55 |
1-2 |
p. 188-197 10 p. |
article |
14 |
Differential fault analysis on block cipher SEED
|
Jeong, Kitae |
|
2012 |
55 |
1-2 |
p. 26-34 9 p. |
article |
15 |
Discrete logarithm problem using index calculus method
|
Padmavathy, R. |
|
2012 |
55 |
1-2 |
p. 161-169 9 p. |
article |
16 |
Editorial Board
|
|
|
2012 |
55 |
1-2 |
p. iii-iv nvt p. |
article |
17 |
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
|
Mun, Hyeran |
|
2012 |
55 |
1-2 |
p. 214-222 9 p. |
article |
18 |
Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography
|
Vasyltsov, Ihor |
|
2012 |
55 |
1-2 |
p. 256-267 12 p. |
article |
19 |
Improving performance of network covert timing channel through Huffman coding
|
Wu, Jingzheng |
|
2012 |
55 |
1-2 |
p. 69-79 11 p. |
article |
20 |
Mining constraints in role-based access control
|
Ma, Xiaopu |
|
2012 |
55 |
1-2 |
p. 87-96 10 p. |
article |
21 |
Modeling and quantitatively predicting software security based on stochastic Petri nets
|
Yang, Nianhua |
|
2012 |
55 |
1-2 |
p. 102-112 11 p. |
article |
22 |
On the number of rotation symmetric functions over G F ( p )
|
Fu, Shaojing |
|
2012 |
55 |
1-2 |
p. 142-150 9 p. |
article |
23 |
On-the-spot digital investigation by means of LDFS: Live Data Forensic System
|
Lim, Kyung-Soo |
|
2012 |
55 |
1-2 |
p. 223-240 18 p. |
article |
24 |
On weaknesses of the HDCP authentication and key exchange protocol and its repair
|
Zhao, Jianjie |
|
2012 |
55 |
1-2 |
p. 19-25 7 p. |
article |
25 |
Related key chosen IV attacks on Decim v2 and Decim-128
|
Lin, Ding |
|
2012 |
55 |
1-2 |
p. 123-133 11 p. |
article |
26 |
Securing mobile network prefix provisioning for NEMO based vehicular networks
|
Lee, Jong-Hyouk |
|
2012 |
55 |
1-2 |
p. 170-187 18 p. |
article |
27 |
Task-based behavior detection of illegal codes
|
Han, Lansheng |
|
2012 |
55 |
1-2 |
p. 80-86 7 p. |
article |