-
1
-
-
20444434710
-
How to search a social network
-
July
-
L. Adamic and E. Adar, "How to search a social network," Social Networks, 27(3):187-203, July 2005.
-
(2005)
Social Networks
, vol.27
, Issue.3
, pp. 187-203
-
-
Adamic, L.1
Adar, E.2
-
3
-
-
70350068836
-
Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability
-
(Wiley) Feb. 29
-
D. Takahashi and Y. Xiao, "Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability," (Wiley) Security and Communication Networks. Vol. 1. No. 2, pp. 147-160, Feb. 29, 2008.
-
(2008)
Security and Communication Networks
, vol.1
, Issue.2
, pp. 147-160
-
-
Takahashi, D.1
Xiao, Y.2
-
4
-
-
0042855693
-
An experimental study of search in global social networks
-
DOI 10.1126/science.1081058
-
P. S. Dodds, R. Muhamad and D. J. Watts, "An experimental study of search in global social networks," Science 301, 827-829, 2003. (Pubitemid 36962622)
-
(2003)
Science
, vol.301
, Issue.5634
, pp. 827-829
-
-
Dodds, P.S.1
Muhamad, R.2
Watts, D.J.3
-
5
-
-
0000622740
-
Reverse small world experiment
-
P. Killworth and H. Bernard, "Reverse small world experiment," Social Networks 1, 159-192, 1978.
-
(1978)
Social Networks
, vol.1
, pp. 159-192
-
-
Killworth, P.1
Bernard, H.2
-
6
-
-
84938051815
-
A pseudomodel of the small world problem
-
P. D. Killworth and H. R. Bernard, "A pseudomodel of the small world problem," Social Forces 58 (2), 477-505, 1979.
-
(1979)
Social Forces
, vol.58
, Issue.2
, pp. 477-505
-
-
Killworth, P.D.1
Bernard, H.R.2
-
7
-
-
84970354110
-
Patterns of acquaintanceship in society and complex organization: A comparative study of the small world problem
-
C. C. Lunfberg, "Patterns of acquaintanceship in society and complex organization: a comparative study of the small world problem," Pacific Sociological Review 18, 206-222, 1975.
-
(1975)
Pacific Sociological Review
, vol.18
, pp. 206-222
-
-
Lunfberg, C.C.1
-
8
-
-
0002687371
-
The small-world problem
-
S. Milgram, "The small-world problem" Psychology Today 1, 62-67, 1967.
-
(1967)
Psychology Today
, vol.1
, pp. 62-67
-
-
Milgram, S.1
-
9
-
-
0001504032
-
An experimental study of the small world problem
-
J. Travers and S. Milgram, "An experimental study of the small world problem," Sociometry 32, 425-443, 1969.
-
(1969)
Sociometry
, vol.32
, pp. 425-443
-
-
Travers, J.1
Milgram, S.2
-
10
-
-
0037123661
-
Identity and search in social networks
-
D. J. Watts, P. S. Dodds and M. E. J. Newman, "Identity and search in social networks," Science 296, 1302-1305, 2002.
-
(2002)
Science
, vol.296
, pp. 1302-1305
-
-
Watts, D.J.1
Dodds, P.S.2
Newman, M.E.J.3
-
11
-
-
0003677229
-
-
rd Ed., Graduate Texts in Mathematics, Springer
-
rd Ed., Graduate Texts in Mathematics, Springer, 2006.
-
(2006)
Graph Theory
-
-
Diestel, R.1
-
13
-
-
0343441557
-
Navigation in a small world
-
J. Kleinberg, "Navigation in a small world," Nature 406, 2000.
-
(2000)
Nature
, vol.406
-
-
Kleinberg, J.1
-
17
-
-
51249106649
-
Complexity Analysis of Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability
-
D. Takahashi and Y. Xiao, "Complexity Analysis of Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability," Proc. of IEEE ICC 2008, pp.1474-1478.
-
Proc. of IEEE ICC 2008
, pp. 1474-1478
-
-
Takahashi, D.1
Xiao, Y.2
-
18
-
-
70350060199
-
Flow-Net Methodology for Accountability in Wireless Networks
-
Sept./Oct.
-
Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks," IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37.
-
(2009)
IEEE Network
, vol.23
, Issue.5
, pp. 30-37
-
-
Xiao, Y.1
-
19
-
-
79951647755
-
Implementation and Evaluation of Accountability using Flow-net in Wireless Networks
-
Y. Xiao, K. Meng, and D. Takahashi, "Implementation and Evaluation of Accountability using Flow-net in Wireless Networks," Proc. of IEEE MILCOM 2010
-
Proc. of IEEE MILCOM 2010
-
-
Xiao, Y.1
Meng, K.2
Takahashi, D.3
-
20
-
-
85081509943
-
-
Web site
-
Web site: http://www.jgraph.com
-
-
-
-
21
-
-
85081500001
-
-
http://www.mysql.com/
-
-
-
-
22
-
-
85081526151
-
-
http://www.java.com
-
-
-
-
23
-
-
85081499070
-
-
http://www.mysql.com/products/connector/j/
-
-
-
-
24
-
-
70449842997
-
Using an edge-dual graph and k-connectivity to identify strong connections in social networks
-
L. Ding and B. Dixon, "Using an edge-dual graph and k-connectivity to identify strong connections in social networks," Proc. of the ACM 46th Annual Southeast Regional Conference, pp. 475-480, 2008.
-
(2008)
Proc. of the ACM 46th Annual Southeast Regional Conference
, pp. 475-480
-
-
Ding, L.1
Dixon, B.2
-
25
-
-
79551646596
-
An Implementation Scheme of Flow-Net and Its Applications on Detecting Attacks in Wireless Networks
-
B. Fu and Y. Xiao, "An Implementation Scheme of Flow-Net and Its Applications on Detecting Attacks in Wireless Networks," Proc. of IEEE GLOBECOM 2010
-
Proc. of IEEE GLOBECOM 2010
-
-
Fu, B.1
Xiao, Y.2
-
26
-
-
79951631723
-
Foreword
-
R. Mayrhofer, K. Nyberg, and T. Kindberg, "Foreword," International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp. 1-3, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 1-3
-
-
Mayrhofer, R.1
Nyberg, K.2
Kindberg, T.3
-
27
-
-
61849163799
-
Proximity-based authentication of mobile devices
-
A. Scannell, A. Varshavsky, A. LaMarca, and E. De Lara, "Proximity-based authentication of mobile devices," International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp. 4-16, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 4-16
-
-
Scannell, A.1
Varshavsky, A.2
LaMarca, A.3
De Lara, E.4
-
28
-
-
61849147296
-
Secure pairing of interface constrained devices
-
C. Soriente, G. Tsudik, and E. Uzun, "Secure pairing of interface constrained devices," International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp. 17-26, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 17-26
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
29
-
-
61849134762
-
Secure pairing with biometrics
-
I. Buhan, B. Boom, J. Doumen, P, H. Hartel, and R, N.J. Veldhuis, "Secure pairing with biometrics," International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp. 27-42, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 27-42
-
-
Buhan, I.1
Boom, B.2
Doumen, J.3
Hartel, P.H.4
Veldhuis, R.N.J.5
-
30
-
-
61849133288
-
Seeing-Is-Believing: Using camera phones for human-verifiable authentication
-
J. M. McCune, A. Perrig, and M. K. Reiter, "Seeing-Is-Believing: using camera phones for human-verifiable authentication," International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp. 43-56, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 43-56
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
31
-
-
61849184822
-
Using audio in secure device pairing
-
M. T. Goodrich, M. Sirivianos, J. Solis, C. Soriente, G. Tsudik, and E. Uzun, "Using audio in secure device pairing," International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp. 57-68, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 57-68
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Soriente, C.4
Tsudik, G.5
Uzun, E.6
-
32
-
-
61849166040
-
User-aided data authentication
-
S. Laur and S. Pasini, "User-aided data authentication," International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp. 69-86, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 69-86
-
-
Laur, S.1
Pasini, S.2
-
33
-
-
61849117271
-
Standards for security associations in personal networks: A comparative analysis
-
J. Suomalainen, J. Valkonen, and N. Asokan, "Standards for security associations in personal networks: a comparative analysis," International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp. 87-100, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 87-100
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
34
-
-
61849158147
-
Designing user studies for security applications: A case study with wireless network configuration
-
C. Kuo, A. Perrig, and J. Walker, "Designing user studies for security applications: a case study with wireless network configuration," International Journal of Security and Networks, Vol. 409, Nos. 1/2, pp. 101-109, 2009.
-
(2009)
International Journal of Security and Networks
, vol.409
, Issue.1-2
, pp. 101-109
-
-
Kuo, C.1
Perrig, A.2
Walker, J.3
-
35
-
-
61849085156
-
An evaluation of connection characteristics for separating network attacks
-
R. Berthier and M. Cukier, "An evaluation of connection characteristics for separating network attacks," International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp. 110-124, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 110-124
-
-
Berthier, R.1
Cukier, M.2
-
36
-
-
61849158146
-
An efficient group key management scheme for mobile ad hoc networks
-
B. Wu, J. Wu, and Y. Dong, "An efficient group key management scheme for mobile ad hoc networks," International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp. 125-134, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 125-134
-
-
Wu, B.1
Wu, J.2
Dong, Y.3
-
37
-
-
68149168162
-
Deriving a closed-form expression for worm-scanning strategies
-
Z. Chen, C. Chen, and Y. Li, "Deriving a closed-form expression for worm-scanning strategies," International Journal of Security and Networks, Vol. 4, No.3, pp. 135-144, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 135-144
-
-
Chen, Z.1
Chen, C.2
Li, Y.3
-
38
-
-
68149158275
-
An efficient One-Time Password authentication scheme using a smart card
-
S. Lee and K. M. Sivalingam, "An efficient One-Time Password authentication scheme using a smart card," International Journal of Security and Networks, Vol. 4, No.3, pp. 145-152, 2009
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 145-152
-
-
Lee, S.1
Sivalingam, K.M.2
-
39
-
-
68149124499
-
Using link RTT to passively detect unapproved wireless nodesd
-
L. Watkins, R. Beyah, and C. Corbett, "Using link RTT to passively detect unapproved wireless nodesd," International Journal of Security and Networks, Vol. 4, No.3, pp. 153-163, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 153-163
-
-
Watkins, L.1
Beyah, R.2
Corbett, C.3
-
40
-
-
68149099995
-
Overview of satellite communication networks security: Introduction of EAP
-
K. E. Drakakis, A. D. Panagopoulos, and P. G. Cottis, "Overview of satellite communication networks security: introduction of EAP," International Journal of Security and Networks, Vol. 4, No.3, pp. 164-170, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 164-170
-
-
Drakakis, K.E.1
Panagopoulos, A.D.2
Cottis, P.G.3
-
41
-
-
68149169009
-
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
-
S. Chakrabarti, S. Chandrasekhar, and M. Singhal, "An escrow-less identity-based group-key agreement protocol for dynamic peer groups," International Journal of Security and Networks, Vol. 4, No.3, pp. 171-188, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 171-188
-
-
Chakrabarti, S.1
Chandrasekhar, S.2
Singhal, M.3
-
42
-
-
68149180871
-
Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks
-
S. Ehlert, Y. Rebahi, and T. Magedanz, "Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks," International Journal of Security and Networks, Vol. 4, No.3, pp. 189-200, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 189-200
-
-
Ehlert, S.1
Rebahi, Y.2
Magedanz, T.3
-
43
-
-
70349969846
-
A Proactive Secret Sharing Scheme in matrix projection method
-
L. Bai and X. Zou, "A Proactive Secret Sharing Scheme in matrix projection method," International Journal of Security and Networks, Vol. 4, No.4, pp. 201-209, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 201-209
-
-
Bai, L.1
Zou, X.2
-
44
-
-
70349961783
-
TKS: A transition key management scheme for secure application level multicast
-
H. Bettahar, M. Alkubeily, and A. Bouabdallah, "TKS: a transition key management scheme for secure application level multicast," International Journal of Security and Networks, Vol. 4, No.4, pp. 210-222, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 210-222
-
-
Bettahar, H.1
Alkubeily, M.2
Bouabdallah, A.3
-
45
-
-
70349968221
-
Handling inheritance violation for secure interoperation of heterogeneous systems
-
H. Huang, H. Kirchner, S. Liu, and W. Wu, "Handling inheritance violation for secure interoperation of heterogeneous systems," International Journal of Security and Networks, Vol. 4, No.4, pp.223-233, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 223-233
-
-
Huang, H.1
Kirchner, H.2
Liu, S.3
Wu, W.4
-
46
-
-
70349949111
-
Visibility: A novel concept for characterising provable network digital evidences
-
Slim Rekhis, Noureddine A. Boudriga, "Visibility: a novel concept for characterising provable network digital evidences," International Journal of Security and Networks, Vol. 4, No.4, pp.234-245, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 234-245
-
-
Rekhis, S.1
Boudriga, N.A.2
-
47
-
-
70349950718
-
Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks
-
D. Djenouri, M. Bouamama, and O. Mahmoudi, "Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks," International Journal of Security and Networks, Vol. 4, No.4, pp. 246-262, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 246-262
-
-
Djenouri, D.1
Bouamama, M.2
Mahmoudi, O.3
-
48
-
-
70349968010
-
Attacks and countermeasures in multihop Cognitive Radio Networks
-
F. Hu, D. Dong, and Y. Xiao, "Attacks and countermeasures in multihop Cognitive Radio Networks," International Journal of Security and Networks, Vol. 4, No.4, pp. 263-271, 2009.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 263-271
-
-
Hu, F.1
Dong, D.2
Xiao, Y.3
-
49
-
-
79951651888
-
Editorial
-
M. Yang, J. C.L. Liu, and Y. Tseng, "Editorial," International Journal of Security and Networks, Vol. 5, No.1 pp. 1-3, 2010,
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 1-3
-
-
Yang, M.1
Liu, J.C.L.2
Tseng, Y.3
-
50
-
-
77949837905
-
A backpressure technique for filtering spoofed traffic at upstream routers
-
DOI: 10.1504/IJSN.2010.030718
-
S. Malliga and A. Tamilarasi, "A backpressure technique for filtering spoofed traffic at upstream routers," International Journal of Security and Networks, Vol. 5, No.1 pp. 3-14, 2010, DOI: 10.1504/IJSN.2010. 030718
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 3-14
-
-
Malliga, S.1
Tamilarasi, A.2
-
51
-
-
77949801623
-
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
-
DOI: 10.1504/IJSN.2010.030719
-
S. Huang and S. Shieh, "Authentication and secret search mechanisms for RFID-aware wireless sensor networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 15-25 , 2010, DOI: 10.1504/IJSN.2010.030719
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 15-25
-
-
Huang, S.1
Shieh, S.2
-
52
-
-
77949844099
-
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
-
DOI: 10.1504/IJSN.2010.030720
-
Y. Hsiao and R. Hwang, "An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 26-34 , 2010, DOI: 10.1504/IJSN.2010.030720
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 26-34
-
-
Hsiao, Y.1
Hwang, R.2
-
53
-
-
77949835881
-
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
-
DOI: 10.1504/IJSN.2010.030721
-
L. Xu, S. Chen, X. Huang, and Y. Mu, "Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 35-44, 2010, DOI: 10.1504/IJSN.2010.030721
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 35-44
-
-
Xu, L.1
Chen, S.2
Huang, X.3
Mu, Y.4
-
54
-
-
77949817850
-
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
-
DOI: 10.1504/IJSN.2010.030722
-
K. Tsai, C. Hsu, and T. Wu, "Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 45-52, 2010, DOI: 10.1504/IJSN.2010.030722
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 45-52
-
-
Tsai, K.1
Hsu, C.2
Wu, T.3
-
55
-
-
77949864345
-
Lightweight authentication protocol for mobile RFID networks
-
DOI: 10.1504/IJSN.2010.030723
-
M. Yang, "Lightweight authentication protocol for mobile RFID networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 53-62, 2010, DOI: 10.1504/IJSN.2010.030723
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 53-62
-
-
Yang, M.1
-
56
-
-
77949830969
-
A cross-layer authentication design for secure video transportation in wireless sensor network
-
DOI: 10.1504/IJSN.2010.030724
-
J. Wang and G.L. Smith, "A cross-layer authentication design for secure video transportation in wireless sensor network," International Journal of Security and Networks, Vol. 5, No.1 pp. 63-76, 2010, DOI: 10.1504/IJSN.2010.030724
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 63-76
-
-
Wang, J.1
Smith, G.L.2
-
57
-
-
77949732329
-
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
-
DOI: 10.1504/IJSN.2010.032216
-
H. Guo, Y. Mu, X.Y. Zhang, and Z.J. Li, "Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 173-187, 2010, DOI: 10.1504/IJSN.2010.032216
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 173-187
-
-
Guo, H.1
Mu, Y.2
Zhang, X.Y.3
Li, Z.J.4
-
58
-
-
77949752019
-
Security assessments of IEEE 802.15.4 standard based on X.805 framework
-
DOI: 10.1504/IJSN.2010.032217
-
A. O. Richard, A. Ahmad, and K. Kiseon, " Security assessments of IEEE 802.15.4 standard based on X.805 framework," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 188-197, 2010, DOI: 10.1504/IJSN.2010.032217
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 188-197
-
-
Richard, A.O.1
Ahmad, A.2
Kiseon, K.3
-
59
-
-
77949729303
-
Experimental analysis of application-level intrusion detection algorithms
-
DOI: 10.1504/IJSN.2010.032218
-
Y. Dong, S. Hsu, S. Rajput, and B. Wu, "Experimental analysis of application-level intrusion detection algorithms," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 198-205, 2010, DOI: 10.1504/IJSN.2010.032218
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 198-205
-
-
Dong, Y.1
Hsu, S.2
Rajput, S.3
Wu, B.4
|