Publisher: Inderscience Publishers
Founded in: 2006
Total resources: 24
E-ISSN: 1747-8413
ISSN: 1747-8405
Subject: TP3 Computers
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
International Journal of Security and Networks
Menu
Pattern overlap in bit-parallel implementation of regular expression repetition quantifiers
By Cronin Brendan,Wang Xiaojun in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 4, 2013-12 , pp.Runtime verification using policy-based approach to control information flow
International Journal of Security and Networks , Vol. 8, Iss. 4, 2013-12 , pp.On effective data aggregation techniques in host-based intrusion detection in MANET
By Zhang Difan,Ge Linqiang,Yu Wei,Zhang Hanlin,Hardy Rommie L.,Reschly Robert J. in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 4, 2013-12 , pp.Security analysis and improvement of two verifiable multi-secret sharing schemes
By Yu Jia,Hao Rong,Cheng Xiangguo in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 4, 2013-12 , pp.On the security of two improved authenticated encryption schemes
By Rasslan Mohamed,Aslan Heba K. in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 4, 2013-12 , pp.ECC-based anti-phishing protocol for cloud computing services
By Kalra Sheetal,Sood Sandeep in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 3, 2013-11 , pp.A model for quantitative security measurement and prioritisation of vulnerability mitigation
By Tripathi Anshu,Singh Umesh Kumar in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 3, 2013-11 , pp.Wi-Fi access denial of service attack to smartphones
By Dondyk Erich,Rivera Louis,Zou Cliff C. in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 3, 2013-11 , pp.Enabling decentralised microblogging through P2PVPNs
By Juste Pierre St,Eom Heungsik,Woodruff Benjamin,Baker Corey,Figueiredo Renato in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 3, 2013-11 , pp.