Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Journal
    Name: I. J. Network Security
    Year: 2010
    Volume: 10
    Number: 1
    DBLP: db/journals/ijnsec/ijnsec10.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 29  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Chunxiang Gu, Yuefei Zhu.
    New Efficient Searchable Encryption Schemes from Bilinear Pairings.
    I. J. Network Security 2010, Volume 10 (0) 2010
    Journal article
    Tongjiang Yan.
    New Binary Sequences of Period
    I. J. Network Security 2010, Volume 10 (0) 2010
    Journal article
    Xiaozhuo Gu, Jianzu Yang.
    Design Universal Security Scheme for Broadband Router.
    I. J. Network Security 2010, Volume 10 (0) 2010
    Journal article
    Hongwei Li, Atam P. Dhawan.
    MOSAR: A Secured On-demand Routing Protocol for Mobile Multilevel Ad Hoc Networks.
    I. J. Network Security 2010, Volume 10 (0) 2010
    Journal article
    I-Shi Lee, Wen-Hsiang Tsai.
    Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code.
    I. J. Network Security 2010, Volume 10 (0) 2010
    Journal article
    Diaa Salama Abd Elminaam, Hatem Mohamed Abdual-Kader, Mohiy Mohamed Hadhoud.
    Evaluating The Performance of Symmetric Encryption Algorithms.
    I. J. Network Security 2010, Volume 10 (0) 2010
    Journal article
    R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanagaraj, R. Chidambaram Kalimuthu, R. Dharmaraj.
    Secure Group Key Management Scheme for Multicast Networks.
    I. J. Network Security 2010, Volume 10 (0) 2010
    Journal article
    Loránd Szöllösi, Tamás Marosits, Gábor Fehér.
    Accelerating RSA Encryption Using Random Precalculations.
    I. J. Network Security 2010, Volume 10 (0) 2010
    Journal article
    Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, Balasubramaniam Srinivasan.
    Dynamic Key Cryptography and Applications.
    I. J. Network Security 2010, Volume 10 (0) 2010
    Journal article
    Malliga Subramanian, Tamilarasi Angamuthu.
    An Autonomous Framework for Early Detection of Spoofed Flooding Attacks.
    I. J. Network Security 2010, Volume 10 (0) 2010
    Show item 1 to 10 of 29  

    Your query returned 29 matches in the database.