Sciweavers

110 search results - page 1 / 22
» ijnsec 2006
Sort
View
84
Voted
IJNSEC
2007
83views more  IJNSEC 2007»
15 years 21 days ago
Security Analysis of Double Length Compression Function Based on Block Cipher
Pin Lin, Wenling Wu, Chuankun Wu
71
Voted
IJNSEC
2007
91views more  IJNSEC 2007»
15 years 21 days ago
A Truthful Geographic Forwarding Algorithm for Ad-hoc Networks with Selfish Nodes
Yongwei Wang, Venkata C. Giruka, Mukesh Singhal
86
Voted
IJNSEC
2006
54views more  IJNSEC 2006»
15 years 24 days ago
Security Management in the Next Generation Wireless Networks
Yan Zhang, Masayuki Fujise
64
Voted
IJNSEC
2006
56views more  IJNSEC 2006»
15 years 24 days ago
New Class of Cryptographic Primitives and Cipher Design for Networks Security
Nikolay A. Moldovyan, Alexander A. Moldovyan, Ma A...
104
Voted
IJNSEC
2007
130views more  IJNSEC 2007»
15 years 21 days ago
Central Manager: A Solution to Avoid Denial Of Service Attacks for Wireless LANs
802.1x is a security protocol based on the frame structure
Ping Ding