Volume 7, Number 1, July 2008
Kim-Kwang Raymond Choo
: Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols.
: Fast Algorithms for Determining the Minimal Polynomials of Sequences with Period kn Over GF(Pm).
: Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks.
Volume 7, Number 2, September 2008
: Improvement on Nominative Proxy Signature Schemes.
: Repairing Efficient Threshold Group Signature Scheme.
, P. D. Srivastava
: A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security.
: A New General Transparency Model for Block-based Watermarking Method.
: ID-based Weak Blind Signature From Bilinear Pairings.
Volume 7, Number 3, November 2008
, Po-Wei Hsu
: A Fragile Associative Watermarking on 2D Barcode for Data Authentication.
, Yuefei Zhu
: Proof of Forward Security for Password-based Authenticated Key Exchange.
Ashok Kumar Das
: ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks.