![](/images/ico/ico_close.png)
![](/images/ico/ico3.png)
Publisher: Inderscience Publishers
Founded in: 2006
Total resources: 24
E-ISSN: 1747-8413
ISSN: 1747-8405
Subject: TP3 Computers
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
International Journal of Security and Networks
Menu
![](/images/ico/ico5.png)
Pattern overlap in bit-parallel implementation of regular expression repetition quantifiers
By Cronin Brendan,Wang Xiaojun in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 4, 2013-12 , pp.![](/images/ico/ico5.png)
![](/images/ico/ico5.png)
Runtime verification using policy-based approach to control information flow
International Journal of Security and Networks , Vol. 8, Iss. 4, 2013-12 , pp.![](/images/ico/ico5.png)
On effective data aggregation techniques in host-based intrusion detection in MANET
By Zhang Difan,Ge Linqiang,Yu Wei,Zhang Hanlin,Hardy Rommie L.,Reschly Robert J. in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 4, 2013-12 , pp.![](/images/ico/ico5.png)
Security analysis and improvement of two verifiable multi-secret sharing schemes
By Yu Jia,Hao Rong,Cheng Xiangguo in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 4, 2013-12 , pp.![](/images/ico/ico5.png)
On the security of two improved authenticated encryption schemes
By Rasslan Mohamed,Aslan Heba K. in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 4, 2013-12 , pp.![](/images/ico/ico5.png)
ECC-based anti-phishing protocol for cloud computing services
By Kalra Sheetal,Sood Sandeep in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 3, 2013-11 , pp.![](/images/ico/ico5.png)
A model for quantitative security measurement and prioritisation of vulnerability mitigation
By Tripathi Anshu,Singh Umesh Kumar in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 3, 2013-11 , pp.![](/images/ico/ico5.png)
Wi-Fi access denial of service attack to smartphones
By Dondyk Erich,Rivera Louis,Zou Cliff C. in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 3, 2013-11 , pp.![](/images/ico/ico5.png)
Enabling decentralised microblogging through P2PVPNs
By Juste Pierre St,Eom Heungsik,Woodruff Benjamin,Baker Corey,Figueiredo Renato in (2013)
International Journal of Security and Networks , Vol. 8, Iss. 3, 2013-11 , pp.