-
2
-
-
79960571912
-
-
http://hadoop.apache.org/
-
-
-
-
3
-
-
37549003336
-
MapReduce: Simplified data processing on large clusters
-
J. Dean and S. Ghemawat, "MapReduce: simplified data processing on large clusters," Commun. ACM, vol. 51, 2008, pp. 107-113.
-
(2008)
Commun. ACM
, vol.51
, pp. 107-113
-
-
Dean, J.1
Ghemawat, S.2
-
4
-
-
41149122088
-
The role of accountability in dependable distributed systems
-
A.R. Yumerefendi and J.S. Chase, "The role of accountability in dependable distributed systems," Proc. of HotDep, 2005.
-
(2005)
Proc. of HotDep
-
-
Yumerefendi, A.R.1
Chase, J.S.2
-
6
-
-
0003969633
-
-
Department of Defense. Technical Report 5200.28-STD, Department of Defense
-
Department of Defense. Trusted Computer System Evaluation Criteria. Technical Report 5200.28-STD, Department of Defense, 1985.
-
(1985)
Trusted Computer System Evaluation Criteria.
-
-
-
7
-
-
70350060199
-
Flow-net methodology for accountability in wireless networks
-
Sept./Oct.
-
Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks," IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37.
-
(2009)
IEEE Network
, vol.23
, Issue.5
, pp. 30-37
-
-
Xiao, Y.1
-
8
-
-
77950842153
-
SecureMR: A service integrity assurance framework for mapreduce
-
W. Wei, J. Du, T. Yu, and X. Gu, "SecureMR: A Service Integrity Assurance Framework for MapReduce," Proceedings of the 2009 Annual Computer Security Applications Conference, 2009, pp. 73-82.
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference
, pp. 73-82
-
-
Wei, W.1
Du, J.2
Yu, T.3
Gu, X.4
-
10
-
-
85015649873
-
Airavat: Security and privacy for MapReduce
-
I. Roy, S. Setty, A. Kilzer, V. Shmatikov, and E. Witchel, "Airavat: Security and privacy for MapReduce," Proc. USENIX Symposium on Networked Systems Design and Implementation, 2010, pp. 297-312.
-
(2010)
Proc. USENIX Symposium on Networked Systems Design and Implementation
, pp. 297-312
-
-
Roy, I.1
Setty, S.2
Kilzer, A.3
Shmatikov, V.4
Witchel, E.5
-
11
-
-
79960569161
-
-
J. Schlesinger, "Cloud Security in Map/Reduce," 2009. http://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-jas on-schlesinger-cloud-security.pdf
-
(2009)
Cloud Security in Map/Reduce
-
-
Schlesinger, J.1
-
12
-
-
56049109090
-
Map-reduce for machine learning on multicore
-
C.T. Chu, S.K. Kim, Y.A. Lin, Y.Y. Yu, G. Bradski, A.Y. Ng, and K. Olukotun, "Map-reduce for machine learning on multicore," Advances in Neural Information Processing Systems 19: Proceedings of the 2006 Conference, 2007, p. 281-288.
-
(2007)
Advances in Neural Information Processing Systems 19: Proceedings of the 2006 Conference
, pp. 281-288
-
-
Chu, C.T.1
Kim, S.K.2
Lin, Y.A.3
Yu, Y.Y.4
Bradski, G.5
Ng, A.Y.6
Olukotun, K.7
-
13
-
-
77956238239
-
Brief announcement: Modelling MapReduce for optimal execution in the cloud
-
A. Wieder, P. Bhatotia, A. Post, and R. Rodrigues, "Brief announcement: modelling MapReduce for optimal execution in the cloud," Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing, 2010, pp. 408-409.
-
(2010)
Proceeding of the 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing
, pp. 408-409
-
-
Wieder, A.1
Bhatotia, P.2
Post, A.3
Rodrigues, R.4
-
15
-
-
63649149613
-
Self-service, prorated super computing fun!
-
D. Gottfrid, "Self-service, Prorated Super Computing Fun!". The New York Times. http://open.blogs.nytimes.com/2007/11/01/self-service-prorated- super-computing-fun/?scp=1&sq=self%20service%20prorated&st=cse.
-
The New York Times
-
-
Gottfrid, D.1
-
16
-
-
63549097654
-
Mars: A MapReduce framework on graphics processors
-
B. He, W. Fang, Q. Luo, N.K. Govindaraju, and T. Wang, "Mars: a MapReduce framework on graphics processors," Proceedings of the 17th international conference on Parallel architectures and compilation techniques, 2008, pp. 260-269.
-
(2008)
Proceedings of the 17th International Conference on Parallel Architectures and Compilation Techniques
, pp. 260-269
-
-
He, B.1
Fang, W.2
Luo, Q.3
Govindaraju, N.K.4
Wang, T.5
-
17
-
-
62749127314
-
Mapreduce for data intensive scientific analyses
-
J. Ekanayake, S. Pallickara, and G. Fox, "Mapreduce for data intensive scientific analyses," IEEE Fourth International Conference on eScience, 2008. eScience'08, 2008, pp. 277-284.
-
(2008)
IEEE Fourth International Conference on EScience, 2008. eScience'08
, pp. 277-284
-
-
Ekanayake, J.1
Pallickara, S.2
Fox, G.3
-
19
-
-
68249129760
-
Above the clouds: A berkeley view of cloud computing
-
EECS Department, University of California, Berkeley
-
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and others, "Above the clouds: A berkeley view of cloud computing," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, 2009.
-
(2009)
Tech. Rep. UCB/EECS-2009-28
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
-
21
-
-
85088777233
-
A collaborative monitoring mechanism for making a multitenant platform accountable
-
C. Wang and Y. Zhou, "A Collaborative Monitoring Mechanism for Making a Multitenant Platform Accountable." Hotcloud 2010.
-
(2010)
Hotcloud
-
-
Wang, C.1
Zhou, Y.2
-
22
-
-
78650662129
-
Enhancing intrusion detection system with proximity information
-
Z. Zhuang, Y. Li, and Z. Chen, "Enhancing Intrusion Detection System with proximity information," International Journal of Security and Networks, Vol. 5, No.4 pp. 207-219, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 207-219
-
-
Zhuang, Z.1
Li, Y.2
Chen, Z.3
-
23
-
-
78650634152
-
Efficient decision tree for protocol analysis in intrusion detection
-
T. Abbes, A. Bouhoula, and M. Rusinowitch, "Efficient decision tree for protocol analysis in intrusion detection," International Journal of Security and Networks, Vol. 5, No.4 pp. 220-235, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 220-235
-
-
Abbes, T.1
Bouhoula, A.2
Rusinowitch, M.3
-
24
-
-
78650637965
-
An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols
-
K. R. Schrader, B. E. Mullins, G. L. Peterson, and R. F. Mills, "An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols," International Journal of Security and Networks, Vol. 5, No.4 pp. 236-247, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 236-247
-
-
Schrader, K.R.1
Mullins, B.E.2
Peterson, G.L.3
Mills, R.F.4
-
25
-
-
78650658214
-
On the scalability of delay-tolerant botnets
-
Z. Chen, C. Chen, and Q. Wang, "On the scalability of Delay-Tolerant Botnets," International Journal of Security and Networks, Vol. 5, No.4 pp. 248-258, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 248-258
-
-
Chen, Z.1
Chen, C.2
Wang, Q.3
-
26
-
-
78650656608
-
Detect DDoS flooding attacks in mobile ad hoc networks
-
Y. Guo and S. Perreau, "Detect DDoS flooding attacks in mobile ad hoc networks," International Journal of Security and Networks, Vol. 5, No.4 pp. 259-269, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 259-269
-
-
Guo, Y.1
Perreau, S.2
-
27
-
-
77949732329
-
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
-
H. Guo, Y. Mu, X.Y. Zhang, and Z.J. Li, "Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 173-187, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 173-187
-
-
Guo, H.1
Mu, Y.2
Zhang, X.Y.3
Li, Z.J.4
-
28
-
-
77949752019
-
Security assessments of IEEE 802.15.4 standard based on X.805 framework
-
A. O. Richard, A. Ahmad, and K. Kiseon, " Security assessments of IEEE 802.15.4 standard based on X.805 framework," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 188-197, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 188-197
-
-
Richard, A.O.1
Ahmad, A.2
Kiseon, K.3
-
29
-
-
77949729303
-
Experimental analysis of application-level intrusion detection algorithms
-
Y. Dong, S. Hsu, S. Rajput, and B. Wu, "Experimental analysis of application-level intrusion detection algorithms," International Journal of Security and Networks, Vol. 5, No.2/3 pp. 198-205, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 198-205
-
-
Dong, Y.1
Hsu, S.2
Rajput, S.3
Wu, B.4
-
30
-
-
79951651888
-
Editorial
-
M. Yang, J. C.L. Liu, and Y. Tseng, "Editorial," International Journal of Security and Networks, Vol. 5, No.1 pp. 1-3, 2010
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 1-3
-
-
Yang, M.1
Liu, J.C.L.2
Tseng, Y.3
-
31
-
-
77949837905
-
A backpressure technique for filtering spoofed traffic at upstream routers
-
S. Malliga and A. Tamilarasi, "A backpressure technique for filtering spoofed traffic at upstream routers," International Journal of Security and Networks, Vol. 5, No.1 pp. 3-14, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 3-14
-
-
Malliga, S.1
Tamilarasi, A.2
-
32
-
-
77949801623
-
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
-
S. Huang and S. Shieh, "Authentication and secret search mechanisms for RFID-aware wireless sensor networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 15-25, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 15-25
-
-
Huang, S.1
Shieh, S.2
-
33
-
-
77949844099
-
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
-
Y. Hsiao and R. Hwang, "An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 26-34, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 26-34
-
-
Hsiao, Y.1
Hwang, R.2
-
34
-
-
77949835881
-
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
-
L. Xu, S. Chen, X. Huang, and Y. Mu, "Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 35-44, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 35-44
-
-
Xu, L.1
Chen, S.2
Huang, X.3
Mu, Y.4
-
35
-
-
77949817850
-
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
-
K. Tsai, C. Hsu, and T. Wu, "Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 45-52, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 45-52
-
-
Tsai, K.1
Hsu, C.2
Wu, T.3
-
36
-
-
77949864345
-
Lightweight authentication protocol for mobile RFID networks
-
M. Yang, "Lightweight authentication protocol for mobile RFID networks," International Journal of Security and Networks, Vol. 5, No.1 pp. 53-62, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 53-62
-
-
Yang, M.1
-
37
-
-
77949830969
-
A cross-layer authentication design for secure video transportation in wireless sensor network
-
J. Wang and G.L. Smith, "A cross-layer authentication design for secure video transportation in wireless sensor network," International Journal of Security and Networks, Vol. 5, No.1 pp. 63-76, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 63-76
-
-
Wang, J.1
Smith, G.L.2
-
38
-
-
67650731620
-
Editorial
-
Y. Xiao, "Editorial," International Journal of Security and Networks, Vol. 1, No.1/2, pp. 1-1, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 1-1
-
-
Xiao, Y.1
-
39
-
-
34548601229
-
Workflow authorisation in mediator-free environments
-
M. Shehab, E. Bertino, and A. Ghafoor, "Workflow authorisation in mediator-free environments," International Journal of Security and Networks, Vol. 1, No.1/2, pp. 2-12, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 2-12
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
40
-
-
56849130276
-
Vulnerability analysis of certificate graphs
-
E. Jung and M. G. Gouda, "Vulnerability analysis of certificate graphs," International Journal of Security and Networks, Vol. 1, No.1/2 pp. 13-23, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 13-23
-
-
Jung, E.1
Gouda, M.G.2
-
41
-
-
54249117650
-
Secure scalable group signature with dynamic joins and separable authorities
-
A. Kiayias and M. Yung, "Secure scalable group signature with dynamic joins and separable authorities," International Journal of Security and Networks, Vol. 1, No.1/2, pp. 24-45, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 24-45
-
-
Kiayias, A.1
Yung, M.2
-
42
-
-
70449688081
-
A survey of key evolving cryptosystems
-
M. Franklin, "A survey of key evolving cryptosystems," International Journal of Security and Networks, Vol. 1, No.1/2, pp. 46-53, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 46-53
-
-
Franklin, M.1
-
43
-
-
70449498446
-
A taxonomy of internet traceback
-
I. Hamadeh and G. Kesidis, "A taxonomy of internet traceback," International Journal of Security and Networks, Vol. 1, No.1/2, pp. 54-61, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 54-61
-
-
Hamadeh, I.1
Kesidis, G.2
-
44
-
-
77954341184
-
An approach to synthesise safe systems
-
A. Jhumka, F. Freiling, C. Fetzer, and N. Suri, "An approach to synthesise safe systems," International Journal of Security and Networks, Vol. 1, No.1/2, pp. 62-74.
-
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 62-74
-
-
Jhumka, A.1
Freiling, F.2
Fetzer, C.3
Suri, N.4
-
45
-
-
74549166520
-
Wireless networking security: Open issues in trust, management, interoperation and measurement
-
J. B. Evans, W. Wang, and B. J. Ewy, "Wireless networking security: open issues in trust, management, interoperation and measurement," International Journal of Security and Networks, Vol. 1, No.1/2, pp. 84-94, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 84-94
-
-
Evans, J.B.1
Wang, W.2
Ewy, B.J.3
-
46
-
-
72449209394
-
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
-
H. Englund and T. Johansson, "Three ways to mount distinguishing attacks on irregularly clocked stream ciphers," International Journal of Security and Networks, Vol. 1, No.1/2 pp. 95-102, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 95-102
-
-
Englund, H.1
Johansson, T.2
-
47
-
-
38349171412
-
Building trust in peer-to-peer systems: A review
-
B. Zhu, S. Jajodia, and M. S. Kankanhalli, "Building trust in peer-to-peer systems: a review," International Journal of Security and Networks, Vol. 1, No.1/2, pp. 103-112, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 103-112
-
-
Zhu, B.1
Jajodia, S.2
Kankanhalli, M.S.3
-
48
-
-
40949119439
-
Secure collaborations over message boards
-
M. Ramkumar and N. Memon, "Secure collaborations over message boards," International Journal of Security and Networks,Vol. 1, No.1/2, pp. 113-124, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 113-124
-
-
Ramkumar, M.1
Memon, N.2
-
49
-
-
79951685922
-
Editorial: Security issues on sensor networks
-
Y. Xiao, X. Jia, B. Sun, and X. Du, "Editorial: security issues on sensor networks," International Journal of Security and Networks, Vol. 1, Nos.3/4, pp.125-126, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 125-126
-
-
Xiao, Y.1
Jia, X.2
Sun, B.3
Du, X.4
-
50
-
-
49949083706
-
Elliptic curve cryptography-based access control
-
H. Wang, B. Sheng, and Q. Li, "Elliptic curve cryptography-based access control," International Journal of Security and Networks, Vol. 1, No.3/4 pp. 127-137, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 127-137
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
51
-
-
79955980141
-
A lightweight encryption and authentication scheme for wireless sensor networks
-
J. Zheng, J. Li, M. J. Lee, and M. Anshel, "A lightweight encryption and authentication scheme for wireless sensor networks," International Journal of Security and Networks 2006-Vol. 1, No.3/4 pp. 138-146, 2006.
-
(2006)
International Journal of Security and Networks 2006
, vol.1
, Issue.3-4
, pp. 138-146
-
-
Zheng, J.1
Li, J.2
Lee, M.J.3
Anshel, M.4
-
52
-
-
79951694028
-
Analysis of routing security-energy trade-offs in wireless sensor networks
-
J. N. Al-Karaki, "Analysis of routing security-energy trade-offs in wireless sensor networks," International Journal of Security and Networks 2006-Vol. 1, No.3/4 pp. 147-157, 2006.
-
(2006)
International Journal of Security and Networks 2006
, vol.1
, Issue.3-4
, pp. 147-157
-
-
Al-Karaki, J.N.1
-
53
-
-
49949107235
-
Load-balanced key establishment methodologies in wireless sensor networks
-
O. Araz and H. Qi, "Load-balanced key establishment methodologies in wireless sensor networks," International Journal of Security and Networks 2006-Vol. 1, No.3/4 pp. 158-166, 2006.
-
(2006)
International Journal of Security and Networks 2006
, vol.1
, Issue.3-4
, pp. 158-166
-
-
Araz, O.1
Qi, H.2
-
54
-
-
84890880165
-
Limiting DoS attacks during multihop data delivery in wireless sensor networks
-
2006
-
J. Deng, R. Han, and S. Mishra, "Limiting DoS attacks during multihop data delivery in wireless sensor networks," International Journal of Security and Networks 2006-Vol. 1, No.3/4 pp. 167-178, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 167-178
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
55
-
-
37849002205
-
End-to-end security mechanisms for SMS
-
J. Hwu, S. Hsu, Y.-B. Lin, and R. Chen, "End-to-end security mechanisms for SMS," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 177-183, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 177-183
-
-
Hwu, J.1
Hsu, S.2
Lin, Y.-B.3
Chen, R.4
-
56
-
-
77955716028
-
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
-
X. Wang, "The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 184-197, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 184-197
-
-
Wang, X.1
-
57
-
-
51249122792
-
A self-encryption authentication protocol for teleconference services
-
Y. Jiang, C. Lin, M. Shi, and X. Shen, "A self-encryption authentication protocol for teleconference services," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 198-205, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 198-205
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.4
-
58
-
-
77955290752
-
An adaptive expert system approach for intrusion detection
-
S. F. Owens and R. R. Levary, "An adaptive expert system approach for intrusion detection," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 206-217, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 206-217
-
-
Owens, S.F.1
Levary, R.R.2
-
59
-
-
77955710234
-
Convertible identity-based anonymous designated ring signatures
-
Y. Chen, W. Susilo, and Y. Mu, "Convertible identity-based anonymous designated ring signatures," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 218-225, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 218-225
-
-
Chen, Y.1
Susilo, W.2
Mu, Y.3
-
60
-
-
79951716783
-
Low-power authenticated group key agreement for heterogeneous wireless networks
-
J. Teo, C. Tan, and J. Ng, "Low-power authenticated group key agreement for heterogeneous wireless networks," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 226-236, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 226-236
-
-
Teo, J.1
Tan, C.2
Ng, J.3
-
61
-
-
77954644745
-
A new signature scheme without random oracles
-
C. Tan, "A new signature scheme without random oracles," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 237-242, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 237-242
-
-
Tan, C.1
-
62
-
-
67649498303
-
Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection
-
Y. Liu, C. Comaniciu, and H. Man, "Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 243-254, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 243-254
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
63
-
-
44649095872
-
A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks
-
V. Karyotis, S. Papavassiliou, M. Grammatikou, and V. Maglaris, "A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks," International Journal of Security and Networks, Vol. 1, Nos.3/4 pp. 255-265, 2006.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 255-265
-
-
Karyotis, V.1
Papavassiliou, S.2
Grammatikou, M.3
Maglaris, V.4
-
64
-
-
85120720332
-
Editorial
-
H. Chen and M.Guizani, "Editorial," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 1-2, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 1-2
-
-
Chen, H.1
Guizani, M.2
-
65
-
-
79551652560
-
DKMS: Distributed hierarchical access control for multimedia networks
-
R. Li, J. Li, and H. Chen, "DKMS: distributed hierarchical access control for multimedia networks," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 3-10, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 3-10
-
-
Li, R.1
Li, J.2
Chen, H.3
-
66
-
-
42649122222
-
Adaptive trust-based anonymous network
-
P. Sakarindr and N. Ansari, "Adaptive trust-based anonymous network," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 11-26, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 11-26
-
-
Sakarindr, P.1
Ansari, N.2
-
67
-
-
74549116861
-
Securing Wi-Fi networks with position verification: Extended version
-
R. A. Malaney, "Securing Wi-Fi networks with position verification: extended version," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 27-36, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 27-36
-
-
Malaney, R.A.1
-
68
-
-
74549171036
-
On pairwise connectivity of wireless multihop networks
-
F. Sun and M. A. Shayman, " On pairwise connectivity of wireless multihop networks," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 37-49, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 37-49
-
-
Sun, F.1
Shayman, M.A.2
-
69
-
-
74049111426
-
Hash-AV: Fast virus signature scanning by cache-resident filters
-
Oz. Erdogan and P. Cao, " Hash-AV: fast virus signature scanning by cache-resident filters," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 50-59, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 50-59
-
-
Erdogan, Oz.1
Cao, P.2
-
70
-
-
79551643767
-
Secure message delivery in publish/subscribe networks using overlay multicast
-
P. Rabinovich and R. Simon, "Secure message delivery in publish/subscribe networks using overlay multicast," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 60-70, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 60-70
-
-
Rabinovich, P.1
Simon, R.2
-
71
-
-
34548366188
-
Optimal worm-scanning method using vulnerable-host distributions
-
Z. Chen and C. Ji, " Optimal worm-scanning method using vulnerable-host distributions," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 71-80, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 71-80
-
-
Chen, Z.1
Ji, C.2
-
72
-
-
79551647519
-
Vulnerabilities in distance-indexed IP traceback schemes
-
J. Pan, L. Cai, and X. Shen, " Vulnerabilities in distance-indexed IP traceback schemes," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 81-94, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 81-94
-
-
Pan, J.1
Cai, L.2
Shen, X.3
-
73
-
-
34547148771
-
8 Single packet IP traceback in AS-level partial deployment scenario
-
T. Korkmaz, C. Gong, K. Sarac, and S. G. Dykes, "8 Single packet IP traceback in AS-level partial deployment scenario," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 95-10, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 95-10
-
-
Korkmaz, T.1
Gong, C.2
Sarac, K.3
Dykes, S.G.4
-
74
-
-
79551646922
-
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
-
H. Ling and T. Znati, "End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 109-121, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 109-121
-
-
Ling, H.1
Znati, T.2
-
75
-
-
39349109602
-
Design and analysis of a multipacket signature detection system
-
N. S. Artan and H. J. Chao, "Design and analysis of a multipacket signature detection system," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 122-136, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 122-136
-
-
Artan, N.S.1
Chao, H.J.2
-
76
-
-
79551551587
-
Analysis of flow-correlation attacks in anonymity network
-
Y. Zhu, X. Fu, R. Bettati, and W. Zhao, " Analysis of flow-correlation attacks in anonymity network," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 137-153, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 137-153
-
-
Zhu, Y.1
Fu, X.2
Bettati, R.3
Zhao, W.4
-
77
-
-
74549177130
-
Defence against packet injection in ad hoc networks
-
Q. Gu, P. Liu, C. Chu, and S. Zhu, "Defence against packet injection in ad hoc networks," International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp. 154-169, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 154-169
-
-
Gu, Q.1
Liu, P.2
Chu, C.3
Zhu, S.4
-
78
-
-
79951639076
-
Editorial
-
Y. Mu, L. Chen, X. Chen, G. Gong, P. Lee, A. Miyaji, J. Pieprzyk, D. Pointcheval, T. Takagi, J. Traore, J. Seberry, W. Susilo, H. Wang, and F. Zhang, "Editorial," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 171-174, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 171-174
-
-
Mu, Y.1
Chen, L.2
Chen, X.3
Gong, G.4
Lee, P.5
Miyaji, A.6
Pieprzyk, J.7
Pointcheval, D.8
Takagi, T.9
Traore, J.10
Seberry, J.11
Susilo, W.12
Wang, H.13
Zhang, F.14
-
79
-
-
85016433011
-
Efficient multicast stream authentication for the fully adversarial network model
-
C. Tartary and H. Wang, "Efficient multicast stream authentication for the fully adversarial network model," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 175-191, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 175-191
-
-
Tartary, C.1
Wang, H.2
-
80
-
-
57849124555
-
Aggregate designated verifier signatures and application to secure routing
-
R. Bhaskar, J. Herranz, and F. Laguillaumie, "Aggregate designated verifier signatures and application to secure routing," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 192-201, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 192-201
-
-
Bhaskar, R.1
Herranz, J.2
Laguillaumie, F.3
-
81
-
-
79951648076
-
LIP: A lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
-
H. Hsu, S. Zhu, and A. R. Hurson, "LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 202-215, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 202-215
-
-
Hsu, H.1
Zhu, S.2
Hurson, A.R.3
-
82
-
-
34548042117
-
On the design of secure protocols for hierarchical sensor networks
-
L. B. Oliveira, H. Wong, A. A.F. Loureiro, and R. Dahab, "On the design of secure protocols for hierarchical sensor networks," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 216-227, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 216-227
-
-
Oliveira, L.B.1
Wong, H.2
Loureiro, A.A.F.3
Dahab, R.4
-
83
-
-
79951645452
-
Server side hashing core exceeding 3 Gbps of throughput
-
H. E. Michail, G. A. Panagiotakopoulos, V. N. Thanasoulis, A. P. Kakarountas, and C. E. Goutis, " Server side hashing core exceeding 3 Gbps of throughput," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 228-238, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 228-238
-
-
Michail, H.E.1
Panagiotakopoulos, G.A.2
Thanasoulis, V.N.3
Kakarountas, A.P.4
Goutis, C.E.5
-
84
-
-
68149086398
-
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
-
K. Hoeper and G. Gong, "Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 239-250, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 239-250
-
-
Hoeper, K.1
Gong, G.2
-
85
-
-
38049042723
-
On security proof of McCullagh-Barreto's key agreement protocol and its variants
-
Z. Cheng and L. Chen, "On security proof of McCullagh-Barreto's key agreement protocol and its variants," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 251-259, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 251-259
-
-
Cheng, Z.1
Chen, L.2
-
86
-
-
77949415724
-
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
-
K. M. Finnigin, B. E. Mullins, R. A. Raines, and H. B. Potoczny, "Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks," International Journal of Security and Networks, Vol. 2, Nos. 3/4,pp. 260-271, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 260-271
-
-
Finnigin, K.M.1
Mullins, B.E.2
Raines, R.A.3
Potoczny, H.B.4
-
87
-
-
66249092571
-
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
-
D. Huang, "Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 272-283, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 272-283
-
-
Huang, D.1
-
88
-
-
79951638712
-
Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol
-
M. Abdalla, E. Bresson, O. Chevassut, B. Moller, and D. Pointcheval, "Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol," International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp. 284-296, 2007.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 284-296
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Moller, B.4
Pointcheval, D.5
-
89
-
-
79951606986
-
Editorial
-
N. Memon and R. Goel, "Editorial," International Journal of Security and Networks, Vol. 3, No. 2, pp. 79, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 79
-
-
Memon, N.1
Goel, R.2
-
90
-
-
77955714466
-
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
-
I. Ray and N. Poolsappasit, "Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents," International Journal of Security and Networks, Vol. 3, No. 2, pp. 80-94, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 80-94
-
-
Ray, I.1
Poolsappasit, N.2
-
91
-
-
70149104596
-
Forensic analysis of SCADA systems and networks
-
T. Kilpatrick, J. Gonzalez, R. Chandia, M. Papa, and S. Shenoi, "Forensic analysis of SCADA systems and networks," International Journal of Security and Networks, Vol. 3, No. 2, pp. 95-102, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 95-102
-
-
Kilpatrick, T.1
Gonzalez, J.2
Chandia, R.3
Papa, M.4
Shenoi, S.5
-
92
-
-
74049092486
-
On the (un)reliability of eavesdropping
-
E, Cronin, M, Sherr, and M, Blaze, "On the (un)reliability of eavesdropping," International Journal of Security and Networks, Vol. 3, No. 2, pp. 103-113, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 103-113
-
-
Cronin, E.1
Sherr, M.2
Blaze, M.3
-
93
-
-
71649087488
-
Using PLSI-U to detect insider threats by datamining e-mail
-
J. S. Okolica, G. L. Peterson, and R. F. Mills, "Using PLSI-U to detect insider threats by datamining e-mail," International Journal of Security and Networks, Vol. 3, No. 2, pp. 114-121, 2008.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 114-121
-
-
Okolica, J.S.1
Peterson, G.L.2
Mills, R.F.3
|