-
1
-
-
33746368048
-
Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks
-
July
-
B. Sun, F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, "Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks," IEEE Transactions on Vehicular Technology, Vol. 55, No. 4, July 2006, pp.1385-1396.
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.4
, pp. 1385-1396
-
-
Sun, B.1
Yu, F.2
Wu, K.3
Xiao, Y.4
Leung, V.C.M.5
-
2
-
-
33745689203
-
Accountability in Electronic Commerce Protocols
-
May
-
R. Kailar, "Accountability in Electronic Commerce Protocols," IEEE Transactions on Software Engineering, vol. 22, no. 5, pp. 313-328, May, 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 313-328
-
-
Kailar, R.1
-
3
-
-
23044534113
-
Practical Reasoning about Accountability in Electronic Commerce Protocols
-
Springer-Verlag, London
-
S. Kungpisdan and Y. Permpoontanalarp, "Practical Reasoning about Accountability in Electronic Commerce Protocols," In Proc. of the 4th international Conference Seoul on information Security and Cryptology (December 06-07, 2001), vol. 2288. Springer-Verlag, London, 268-284.
-
Proc. of the 4th International Conference Seoul on Information Security and Cryptology (December 06-07, 2001)
, vol.2288
, pp. 268-284
-
-
Kungpisdan, S.1
Permpoontanalarp, Y.2
-
4
-
-
0037297882
-
Accountable Web-Computing
-
Feb.
-
A. L. Rosenberg, "Accountable Web-Computing," IEEE Transactions on Parallel and Distributed Systems, vol. 14, no. 2, pp. 97-106, Feb., 2003.
-
(2003)
IEEE Transactions on Parallel and Distributed Systems
, vol.14
, Issue.2
, pp. 97-106
-
-
Rosenberg, A.L.1
-
5
-
-
79551623723
-
Fine-Grain Access Control for Securing Shared Resources in Computational Grids
-
A.R. Butt, S. Adabala, N.H. Kapadia, R. Figueiredo, and J.A.B. Fortes, "Fine-Grain Access Control for Securing Shared Resources in Computational Grids," Proc. of IPDPS.
-
Proc. of IPDPS
-
-
Butt, A.R.1
Adabala, S.2
Kapadia, N.H.3
Figueiredo, R.4
Fortes, J.A.B.5
-
7
-
-
0039334688
-
The security architecture formerly known as stack inspection: A security mechanism for language-based systems
-
Oct.
-
D. S. Wallach, A. W. Appel, and E. W. Felten, "The security architecture formerly known as stack inspection: A security mechanism for language-based systems," ACM Transactions on Software Engineering and Methodology, vol. 9, no. 4, pp. 341-378, Oct. 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 341-378
-
-
Wallach, D.S.1
Appel, A.W.2
Felten, E.W.3
-
9
-
-
1942433797
-
Digital Rights Management {and, or, vs.} the Law
-
April
-
P. Samuelson, "Digital Rights Management {and, or, vs.} the Law," Communications of the ACM, vol. 46, no. 4, pp. 41-45, April 2003.
-
(2003)
Communications of the ACM
, vol.46
, Issue.4
, pp. 41-45
-
-
Samuelson, P.1
-
10
-
-
0027668428
-
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
-
Sept.
-
P. Helman, G. Liepins, "Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse," IEEE Transactions on Software Engineering, vol. 19, no. 9, pp. 886-901, Sept., 1993.
-
(1993)
IEEE Transactions on Software Engineering
, vol.19
, Issue.9
, pp. 886-901
-
-
Helman, P.1
Liepins, G.2
-
11
-
-
0003346599
-
Verification strategies for establishing reliability and validity in qualitative research
-
Article 2
-
Morse, J. M., Barrett, M., Mayan, M., Olson, K., & Spiers, J. (2002). Verification strategies for establishing reliability and validity in qualitative research. International Journal of Qualitative Methods 1 (2), Article 2.
-
(2002)
International Journal of Qualitative Methods
, vol.1
, Issue.2
-
-
Morse, J.M.1
Barrett, M.2
Mayan, M.3
Olson, K.4
Spiers, J.5
-
12
-
-
42649088128
-
Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
-
Apr.
-
Y. Xiao, "Accountability for wireless LANs, ad hoc networks, and wireless mesh networks," IEEE Communications Magazine, Vol. 46, No. 4, Apr. 2008, pp.116-126.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 116-126
-
-
Xiao, Y.1
-
13
-
-
70350068836
-
Retrieving knowledge from auditing log-files for computer and network forensics and accountability
-
Feb.
-
D. Takahashi and Y. Xiao, "Retrieving knowledge from auditing log-files for computer and network forensics and accountability," Security and Communication Networks, Vol. 1, No. 2, Feb. 2008, pp. 147-160.
-
(2008)
Security and Communication Networks
, vol.1
, Issue.2
, pp. 147-160
-
-
Takahashi, D.1
Xiao, Y.2
-
14
-
-
74849122349
-
Building a Wireless Capturing Tool for WiFi
-
Nov./Dec. DOI 10.1002/sec.107
-
K. Meng, Y. Xiao, and S. V. Vrbsky, "Building a Wireless Capturing Tool for WiFi," (Wiley Journal of) Security and Communication Networks, Vol. 2, No. 6, Nov./Dec. 2009, pp. 654-668, DOI 10.1002/sec.107
-
(2009)
(Wiley Journal Of) Security and Communication Networks
, vol.2
, Issue.6
, pp. 654-668
-
-
Meng, K.1
Xiao, Y.2
Vrbsky, S.V.3
-
15
-
-
70350060199
-
Flow-Net Methodology for Accountability in Wireless Networks
-
Sept./Oct.
-
Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks," IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37.
-
(2009)
IEEE Network
, vol.23
, Issue.5
, pp. 30-37
-
-
Xiao, Y.1
-
16
-
-
79951614060
-
-
http://en.wikipedia.org/wiki/Promiscuous-mode
-
-
-
-
17
-
-
79951623832
-
-
http://www.wireshark.org/
-
-
-
-
20
-
-
79951639076
-
Editorial
-
Y. Mu, L. Chen, X. Chen, G. Gong, P. Lee, A. Miyaji, J. Pieprzyk, D. Pointcheval, T. Takagi, J. Traore, J. Seberry, W. Susilo, H. Wang, and F. Zhang, "Editorial," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 171-174, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 171-174
-
-
Mu, Y.1
Chen, L.2
Chen, X.3
Gong, G.4
Lee, P.5
Miyaji, A.6
Pieprzyk, J.7
Pointcheval, D.8
Takagi, T.9
Traore, J.10
Seberry, J.11
Susilo, W.12
Wang, H.13
Zhang, F.14
-
21
-
-
85016433011
-
Efficient multicast stream authentication for the fully adversarial network model
-
C. Tartary and H. Wang, "Efficient multicast stream authentication for the fully adversarial network model," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 175-191, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 175-191
-
-
Tartary, C.1
Wang, H.2
-
22
-
-
57849124555
-
Aggregate designated verifier signatures and application to secure routing
-
R. Bhaskar, J. Herranz, and F. Laguillaumie, "Aggregate designated verifier signatures and application to secure routing," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 192-201, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 192-201
-
-
Bhaskar, R.1
Herranz, J.2
Laguillaumie, F.3
-
23
-
-
79951648076
-
LIP: A lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
-
H. Hsu, S. Zhu, and A. R. Hurson, "LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 202-215, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 202-215
-
-
Hsu, H.1
Zhu, S.2
Hurson, A.R.3
-
24
-
-
34548042117
-
On the design of secure protocols for hierarchical sensor networks
-
L. B. Oliveira, H. Wong, A. A.F. Loureiro, and R. Dahab, "On the design of secure protocols for hierarchical sensor networks," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 216-227, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 216-227
-
-
Oliveira, L.B.1
Wong, H.2
Loureiro, A.A.F.3
Dahab, R.4
-
25
-
-
79951645452
-
Server side hashing core exceeding 3 Gbps of throughput
-
H. E. Michail, G. A. Panagiotakopoulos, V. N. Thanasoulis, A. P. Kakarountas, and C. E. Goutis, " Server side hashing core exceeding 3 Gbps of throughput," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 228-238, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 228-238
-
-
Michail, H.E.1
Panagiotakopoulos, G.A.2
Thanasoulis, V.N.3
Kakarountas, A.P.4
Goutis, C.E.5
-
26
-
-
68149086398
-
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
-
K. Hoeper and G. Gong, "Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 239-250, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 239-250
-
-
Hoeper, K.1
Gong, G.2
-
27
-
-
38049042723
-
On security proof of McCullagh-Barreto's key agreement protocol and its variants
-
Z. Cheng and L. Chen, "On security proof of McCullagh-Barreto's key agreement protocol and its variants," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 251-259, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 251-259
-
-
Cheng, Z.1
Chen, L.2
-
28
-
-
77949415724
-
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
-
K. M. Finnigin, B. E. Mullins, R. A. Raines, and H. B. Potoczny, "Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 260-271, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 260-271
-
-
Finnigin, K.M.1
Mullins, B.E.2
Raines, R.A.3
Potoczny, H.B.4
-
29
-
-
66249092571
-
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
-
D. Huang, "Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 272-283, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 272-283
-
-
Huang, D.1
-
30
-
-
79951638712
-
Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol
-
M. Abdalla, E. Bresson, O. Chevassut, B. Moller, and D. Pointcheval, "Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 284-296, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 284-296
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Moller, B.4
Pointcheval, D.5
-
31
-
-
73549097586
-
Multilayer key establishment for large-scale sensor networks
-
P. Kotzanikolaou, D. D. Vergados, G. Stergiou, and E. Magkos, "Multilayer key establishment for large-scale sensor networks," International Journal of Security and Networks, Vol. 3, No. 1, pp. 1-9, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 1-9
-
-
Kotzanikolaou, P.1
Vergados, D.D.2
Stergiou, G.3
Magkos, E.4
-
32
-
-
84899740998
-
Visualisation of wormholes in underwater sensor networks: A distributed approach
-
W. Wang, J. Kong, B. Bhargava, and M. Gerla, " Visualisation of wormholes in underwater sensor networks: a distributed approach," International Journal of Security and Networks, Vol. 3, No. 1, pp. 10-23, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 10-23
-
-
Wang, W.1
Kong, J.2
Bhargava, B.3
Gerla, M.4
-
33
-
-
85086420396
-
Syntax vs. semantics: Competing approaches to dynamic network intrusion detection
-
W. Scheirer and M. Chuah, "Syntax vs. semantics: competing approaches to dynamic network intrusion detection," International Journal of Security and Networks, Vol. 3, No. 1, pp. 24-35, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 24-35
-
-
Scheirer, W.1
Chuah, M.2
-
34
-
-
79951598312
-
Origins: An approach to trace fast spreading worms to their roots
-
A. L. Burt, M. Darschewski, I. Ray, R. Thurimella, and H. Wu, " Origins: an approach to trace fast spreading worms to their roots," International Journal of Security and Networks, Vol. 3, No. 1, pp. 36-46, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 36-46
-
-
Burt, A.L.1
Darschewski, M.2
Ray, I.3
Thurimella, R.4
Wu, H.5
-
35
-
-
79951619296
-
A novel Conference Key Management solution for Secure Dynamic Conferencing
-
X. Zou and Y. Karandikar, " A novel Conference Key Management solution for Secure Dynamic Conferencing," International Journal of Security and Networks, Vol. 3, No. 1, pp. 47-53, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 47-53
-
-
Zou, X.1
Karandikar, Y.2
-
36
-
-
57349124398
-
Anonymous authentication protocol for GSM networks
-
M. Asadpour, B. Sattarzadeh, and A. Movaghar, " Anonymous authentication protocol for GSM networks," International Journal of Security and Networks, Vol. 3, No. 1, pp. 54-62, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 54-62
-
-
Asadpour, M.1
Sattarzadeh, B.2
Movaghar, A.3
-
37
-
-
79951662876
-
Towards a realistic testbed for wireless network reliability and security performance studies
-
F. Hu, A. Rughoonundon, and L. Celentano, " Towards a realistic testbed for wireless network reliability and security performance studies," International Journal of Security and Networks, Vol. 3, No. 1, pp. 63-77, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 63-77
-
-
Hu, F.1
Rughoonundon, A.2
Celentano, L.3
-
38
-
-
79951606986
-
Editorial
-
N. Memon and R. Goel, "Editorial," International Journal of Security and Networks, Vol. 3, No. 2, pp. 79, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 79
-
-
Memon, N.1
Goel, R.2
-
39
-
-
77955714466
-
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
-
I. Ray and N. Poolsappasit, "Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents," International Journal of Security and Networks, Vol. 3, No. 2, pp. 80-94, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 80-94
-
-
Ray, I.1
Poolsappasit, N.2
-
40
-
-
70149104596
-
Forensic analysis of SCADA systems and networks
-
T. Kilpatrick, J. Gonzalez, R. Chandia, M. Papa, and S. Shenoi, "Forensic analysis of SCADA systems and networks," International Journal of Security and Networks, Vol. 3, No. 2, pp. 95-102, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 95-102
-
-
Kilpatrick, T.1
Gonzalez, J.2
Chandia, R.3
Papa, M.4
Shenoi, S.5
-
41
-
-
74049092486
-
On the (un)reliability of eavesdropping
-
E, Cronin, M, Sherr, and M, Blaze, "On the (un)reliability of eavesdropping," International Journal of Security and Networks, Vol. 3, No. 2, pp. 103-113, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 103-113
-
-
Cronin, M.1
Sherr2
Blaze, M.3
-
42
-
-
71649087488
-
Using PLSI-U to detect insider threats by datamining e-mail
-
J. S. Okolica, G. L. Peterson, and R. F. Mills, "Using PLSI-U to detect insider threats by datamining e-mail," International Journal of Security and Networks, Vol. 3, No. 2, pp. 114-121, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 114-121
-
-
Okolica, J.S.1
Peterson, G.L.2
Mills, R.F.3
-
43
-
-
51849141536
-
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
-
X. Lin, X. Ling, H. Zhu, P. Ho, and X. Shen, "A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks," International Journal of Security and Networks, Vol. 3, No. 2, pp. 122-132, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 122-132
-
-
Lin, X.1
Ling, X.2
Zhu, H.3
Ho, P.4
Shen, X.5
-
44
-
-
77953145198
-
Adaptive clustering for scalable key management in dynamic group communications
-
Y. Challal, S. Gharout, A. Bouabdallah, and H. Bettahar, "Adaptive clustering for scalable key management in dynamic group communications," International Journal of Security and Networks, Vol. 3, No. 2, pp. 133-146, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 133-146
-
-
Challal, Y.1
Gharout, S.2
Bouabdallah, A.3
Bettahar, H.4
-
45
-
-
62249216277
-
Formal modelling and analysis of XML firewall for service-oriented systems
-
H. Xu, M. Ayachit, and A. Reddyreddy, "Formal modelling and analysis of XML firewall for service-oriented systems," International Journal of Security and Networks, Vol. 3, No. 3, pp. 147-160, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 147-160
-
-
Xu, H.1
Ayachit, M.2
Reddyreddy, A.3
-
46
-
-
79951637895
-
Firewall filtering rules analysis for anomalies detection
-
A. Bouhoula, Z. Trabelsi, E. Barka, and M. Benelbahri, "Firewall filtering rules analysis for anomalies detection," International Journal of Security and Networks, Vol. 3, No. 3, pp. 161-172, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 161-172
-
-
Bouhoula, A.1
Trabelsi, Z.2
Barka, E.3
Benelbahri, M.4
-
47
-
-
77954327354
-
PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks
-
F. Li, A. Srinivasan, and J. Wu, "PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks," International Journal of Security and Networks, Vol. 3, No. 3, pp. 173-182, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 173-182
-
-
Li, F.1
Srinivasan, A.2
Wu, J.3
-
48
-
-
79951647154
-
Verifying security protocols by knowledge analysis
-
X. Ma and X. Cheng, "Verifying security protocols by knowledge analysis," International Journal of Security and Networks, Vol. 3, No. 3, pp. 183-192, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 183-192
-
-
Ma, X.1
Cheng, X.2
-
49
-
-
72549101766
-
An agent-based framework for intrusion detection alert verification and event correlation
-
B. Uphoff and J. S. Wong, "An agent-based framework for intrusion detection alert verification and event correlation," International Journal of Security and Networks, Vol. 3, No. 3, pp. 193-200, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 193-200
-
-
Uphoff, B.1
Wong, J.S.2
-
50
-
-
79951661564
-
Secure user-identification and key distribution scheme preserving anonymity
-
S. Tripathy and S. Nandi, " Secure user-identification and key distribution scheme preserving anonymity," International Journal of Security and Networks, Vol. 3, No. 3, pp. 201-205, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 201-205
-
-
Tripathy, S.1
Nandi, S.2
-
51
-
-
77952481544
-
ID-based threshold proxy signcryption scheme from bilinear pairings
-
F. Li, X. Xin, and Y. Hu, " ID-based threshold proxy signcryption scheme from bilinear pairings," International Journal of Security and Networks, Vol. 3, No. 3, pp. 206-215, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 206-215
-
-
Li, F.1
Xin, X.2
Hu, Y.3
|