-
1
-
-
70350060199
-
Flow-net methodology for accountability in wireless networks
-
Xiao Y. Flow-net methodology for accountability in wireless networks. IEEE Network 2009; 23(5): 30-37.
-
(2009)
IEEE Network
, vol.23
, Issue.5
, pp. 30-37
-
-
Xiao, Y.1
-
2
-
-
33746368048
-
Enhancing security using mobility-based anomaly detection in cellular mobile networks
-
Sun B, Yu F, Wu K, Xiao Y, Leung VCM. Enhancing security using mobility-based anomaly detection in cellular mobile networks. IEEE Transactions on Vehicular Technology 2006; 55(4): 1385-1396.
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.4
, pp. 1385-1396
-
-
Sun, B.1
Yu, F.2
Wu, K.3
Xiao, Y.4
Leung, V.C.M.5
-
3
-
-
33745689203
-
Accountability in electronic commerce protocols
-
Kailar R. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering 1996; 22(5): 313-328.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 313-328
-
-
Kailar, R.1
-
4
-
-
23044534113
-
Practical reasoning about accountability in electronic commerce protocols
-
In, 06-07 December 2001, Springer-Verlag: London
-
Kungpisdan S, Permpoontanalarp Y. Practical reasoning about accountability in electronic commerce protocols. In Proc. of the 4th International Conference Seoul on Information Security and Cryptology, 06-07 December 2001, Vol. 2288, Springer-Verlag: London, 2001; 268-284.
-
(2001)
Proc. of the 4th International Conference Seoul on Information Security and Cryptology
, vol.2288
, pp. 268-284
-
-
Kungpisdan, S.1
Permpoontanalarp, Y.2
-
6
-
-
4143113268
-
-
Fine-grain access control for securing shared resources in computational grids. In Proc. of IPDPS
-
Butt AR, Adabala S, Kapadia NH, Figueiredo R, Fortes JAB. Fine-grain access control for securing shared resources in computational grids. In Proc. of IPDPS, 2002.
-
(2002)
-
-
Butt, A.R.1
Adabala, S.2
Kapadia, N.H.3
Figueiredo, R.4
Fortes, J.A.B.5
-
8
-
-
0039334688
-
The security architecture formerly known as stack inspection: a security mechanism for language-based systems
-
Oct
-
Wallach DS, Appel AW, Felten EW. The security architecture formerly known as stack inspection: a security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology Oct. 2000; 9(4): 341-378.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 341-378
-
-
Wallach, D.S.1
Appel, A.W.2
Felten, E.W.3
-
9
-
-
84255197330
-
-
Implementing copyright limitations in rights expression languages. In 2002 ACM Workshop on Digital Rights Management, Washington DC, 18 November
-
Mulligan DK, Burstein A. Implementing copyright limitations in rights expression languages. In 2002 ACM Workshop on Digital Rights Management, Washington DC, 18 November 2002.
-
(2002)
-
-
Mulligan, D.K.1
Burstein, A.2
-
10
-
-
1942433797
-
Digital rights management {and, or, vs.} the law
-
Samuelson P. Digital rights management {and, or, vs.} the law. Communications of the ACM 2003; 46(4): 41-45.
-
(2003)
Communications of the ACM
, vol.46
, Issue.4
, pp. 41-45
-
-
Samuelson, P.1
-
11
-
-
0027668428
-
Statistical foundations of audit trail analysis for the detection of computer misuse
-
Helman P, Liepins G. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Transactions on Software Engineering 1993; 19(9): 886-901.
-
(1993)
IEEE Transactions on Software Engineering
, vol.19
, Issue.9
, pp. 886-901
-
-
Helman, P.1
Liepins, G.2
-
12
-
-
0003346599
-
Verification strategies for establishing reliability and validity in qualitative research
-
Morse JM, Barrett M, Mayan M, Olson K, Spiers J. Verification strategies for establishing reliability and validity in qualitative research. International Journal of Qualitative Methods 2002; 1(2): 1-19.
-
(2002)
International Journal of Qualitative Methods
, vol.1
, Issue.2
, pp. 1-19
-
-
Morse, J.M.1
Barrett, M.2
Mayan, M.3
Olson, K.4
Spiers, J.5
-
13
-
-
84947616842
-
-
-
-
-
14
-
-
79951647755
-
-
Implementation and evaluation of accountability using flow-net in wireless networks. Proceedings of the IEEE Military Communications Conference 2010 (IEEE MILCOM 2010), 31 Oct.-3 Nov
-
Xiao Y, Meng K, Takahashi D. Implementation and evaluation of accountability using flow-net in wireless networks. Proceedings of the IEEE Military Communications Conference 2010 (IEEE MILCOM 2010), 31 Oct.-3 Nov. 2010.
-
(2010)
-
-
Xiao, Y.1
Meng, K.2
Takahashi, D.3
-
15
-
-
84947615746
-
-
Temporal accountability and anonymity in medical sensor networks. ACM/Springer Mobile Networks and Applications (MONET), Special issue on Ubiquitous Body Sensor Networks, accepted.
-
Liu J, Xiao Y. Temporal accountability and anonymity in medical sensor networks. ACM/Springer Mobile Networks and Applications (MONET), Special issue on Ubiquitous Body Sensor Networks, accepted.
-
-
-
Liu, J.1
Xiao, Y.2
-
16
-
-
42649088128
-
Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
-
special issue on Security in Mobile Ad Hoc and Sensor Networks, Doi: 10.1109/MCOM.2008.4481350
-
Xiao Y. Accountability for wireless LANs, ad hoc networks, and wireless mesh networks. IEEE Communication Magazine, special issue on Security in Mobile Ad Hoc and Sensor Networks 2008; 46(4): 116-126. Doi: 10.1109/MCOM.2008.4481350
-
(2008)
IEEE Communication Magazine
, vol.46
, Issue.4
, pp. 116-126
-
-
Xiao, Y.1
-
17
-
-
70350068836
-
Retrieving knowledge from auditing log files for computer and network forensics and accountability
-
Takahashi D, Xiao Y. Retrieving knowledge from auditing log files for computer and network forensics and accountability. Security and Communication Networks 2008; 1(2): 147-160.
-
(2008)
Security and Communication Networks
, vol.1
, Issue.2
, pp. 147-160
-
-
Takahashi, D.1
Xiao, Y.2
-
18
-
-
79957925781
-
-
Accountability in Smart Grids. Proceedings of IEEE Consumer Communications and Networking Conference 2011 (IEEE CCNC 2011), Smart Grids Special Session, accepted.
-
Liu J, Xiao Y, Gao J. Accountability in Smart Grids. Proceedings of IEEE Consumer Communications and Networking Conference 2011 (IEEE CCNC 2011), Smart Grids Special Session, accepted.
-
-
-
Liu, J.1
Xiao, Y.2
Gao, J.3
-
19
-
-
78649625552
-
-
A Quantitative Study of Accountability in Wireless Multi-hop Networks. Proceedings of 2010 39th International Conference on Parallel Processing (ICPP 2010), 13-16 Sept
-
Xiao Z, Xiao Y, Wu J. A Quantitative Study of Accountability in Wireless Multi-hop Networks. Proceedings of 2010 39th International Conference on Parallel Processing (ICPP 2010), 13-16 Sept. 2010.
-
(2010)
-
-
Xiao, Z.1
Xiao, Y.2
Wu, J.3
-
21
-
-
77953884604
-
-
P-accountable networked systems. Proceeding of INFOCOM 2010, Work in Progress (WIP) Track.
-
Xiao Z, Xiao Y. P-accountable networked systems. Proceeding of INFOCOM 2010, Work in Progress (WIP) Track.
-
-
-
Xiao, Z.1
Xiao, Y.2
-
22
-
-
79954594099
-
Subjective audio quality over a secure IEEE 802.11n network
-
Ramsey BW, Mullins BE, Thomas RW, Andel TR. Subjective audio quality over a secure IEEE 802.11n network. International Journal of Security and Networks 2011; 6(1): 53-63.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 53-63
-
-
Ramsey, B.W.1
Mullins, B.E.2
Thomas, R.W.3
Andel, T.R.4
-
24
-
-
79954619874
-
Towards modelling the impact of cyber attacks on a smart grid
-
Kundur D, Feng X, Mashayekh S, Liu S, Zourntos T, Butler-Purry KL. Towards modelling the impact of cyber attacks on a smart grid. International Journal of Security and Networks 2011; 6(1): 2-13.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 2-13
-
-
Kundur, D.1
Feng, X.2
Mashayekh, S.3
Liu, S.4
Zourntos, T.5
Butler-Purry, K.L.6
-
25
-
-
79954597540
-
Privacy protection system and metrics for hiding electrical events
-
Kalogridis G, Denic SZ, Lewis T, Cepeda R. Privacy protection system and metrics for hiding electrical events. International Journal of Security and Networks 2011; 6(1): 14-27.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 14-27
-
-
Kalogridis, G.1
Denic, S.Z.2
Lewis, T.3
Cepeda, R.4
-
26
-
-
79954614519
-
Secure and privacy-preserving information aggregation for smart grids
-
Li F, Luo B, Liu P. Secure and privacy-preserving information aggregation for smart grids. International Journal of Security and Networks 2011; 6(1): 28-39.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 28-39
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
30
-
-
78650637965
-
An FPGA-based system for tracking digital information transmitted via peer-to-peer protocols
-
Schrader KR, Mullins BE, Peterson GL, Mills RF. An FPGA-based system for tracking digital information transmitted via peer-to-peer protocols. International Journal of Security and Networks 2010; 5(4): 236-247.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 236-247
-
-
Schrader, K.R.1
Mullins, B.E.2
Peterson, G.L.3
Mills, R.F.4
-
33
-
-
77949732329
-
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
-
Guo H, Mu Y, Zhang XY, Li ZJ. Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security. International Journal of Security and Networks 2010; 5(2/3): 173-187.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 173-187
-
-
Guo, H.1
Mu, Y.2
Zhang, X.Y.3
Li, Z.J.4
-
35
-
-
77949729303
-
Experimental analysis of application-level intrusion detection algorithms
-
Dong Y, Hsu S, Rajput S, Wu B. Experimental analysis of application-level intrusion detection algorithms. International Journal of Security and Networks 2010; 5(2/3): 198-205.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 198-205
-
-
Dong, Y.1
Hsu, S.2
Rajput, S.3
Wu, B.4
-
37
-
-
77949760270
-
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
-
Leng X, Lien Y, Mayes K, Markantonakis K. An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing. International Journal of Security and Networks 2010; 5(2/3): 79-86.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 79-86
-
-
Leng, X.1
Lien, Y.2
Mayes, K.3
Markantonakis, K.4
-
38
-
-
77949692385
-
Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees
-
Dalton GC, II, Edge KS, Mills RF, Raines RA. Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees. International Journal of Security and Networks 2010; 5(2/3): 87-95.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 87-95
-
-
Dalton II, G.C.1
Edge, K.S.2
Mills, R.F.3
Raines, R.A.4
-
42
-
-
77949694146
-
Security and privacy on low-cost radio frequency identification systems
-
Sun L. Security and privacy on low-cost radio frequency identification systems. International Journal of Security and Networks 2010; 5(2/3): 128-134.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 128-134
-
-
Sun, L.1
-
45
-
-
77949750049
-
A ubiquitous mobile telemedicine system for the elderly using RFID
-
Raad M. A ubiquitous mobile telemedicine system for the elderly using RFID. International Journal of Security and Networks 2010; 5(2/3): 156-164.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 156-164
-
-
Raad, M.1
-
46
-
-
77949666177
-
Perceived barriers to the widespread commercial use of radio frequency identification technology
-
Rodrigues MJ, James K. Perceived barriers to the widespread commercial use of radio frequency identification technology. International Journal of Security and Networks 2010; 5(2/3): 165-172.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 165-172
-
-
Rodrigues, M.J.1
James, K.2
-
49
-
-
77949801623
-
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
-
Huang S, Shieh S. Authentication and secret search mechanisms for RFID-aware wireless sensor networks. International Journal of Security and Networks 2010; 5(1): 15-25.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 15-25
-
-
Huang, S.1
Shieh, S.2
-
50
-
-
77949844099
-
An efficient secure data dissemination scheme for grid structure wireless sensor networks
-
Hsiao Y, Hwang R. An efficient secure data dissemination scheme for grid structure wireless sensor networks. International Journal of Security and Networks 2010; 5(1): 26-34.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 26-34
-
-
Hsiao, Y.1
Hwang, R.2
-
51
-
-
77949835881
-
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
-
Xu L, Chen S, Huang X, Mu Y. Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks. International Journal of Security and Networks 2010; 5(1): 35-44.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 35-44
-
-
Xu, L.1
Chen, S.2
Huang, X.3
Mu, Y.4
-
52
-
-
77949817850
-
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
-
Tsai K, Hsu C, Wu T. Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks. International Journal of Security and Networks 2010; 5(1): 45-52.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 45-52
-
-
Tsai, K.1
Hsu, C.2
Wu, T.3
-
53
-
-
77949864345
-
Lightweight authentication protocol for mobile RFID networks
-
Yang M. Lightweight authentication protocol for mobile RFID networks. International Journal of Security and Networks 2010; 5(1): 53-62.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 53-62
-
-
Yang, M.1
-
54
-
-
77949830969
-
A cross-layer authentication design for secure video transportation in wireless sensor network
-
Wang J, Smith GL. A cross-layer authentication design for secure video transportation in wireless sensor network. International Journal of Security and Networks 2010; 5(1): 63-76.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 63-76
-
-
Wang, J.1
Smith, G.L.2
-
55
-
-
70349969846
-
A proactive secret sharing scheme in matrix projection method
-
Bai L, Zou X. A proactive secret sharing scheme in matrix projection method. International Journal of Security and Networks 2009; 4(4): 201-209.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 201-209
-
-
Bai, L.1
Zou, X.2
-
57
-
-
70349968221
-
Handling inheritance violation for secure interoperation of heterogeneous systems
-
Huang H, Kirchner H, Liu S, Wu W. Handling inheritance violation for secure interoperation of heterogeneous systems. International Journal of Security and Networks 2009; 4(4): 223-233.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 223-233
-
-
Huang, H.1
Kirchner, H.2
Liu, S.3
Wu, W.4
-
58
-
-
70349949111
-
Visibility: a novel concept for characterising provable network digital evidences
-
Rekhis S, Boudriga NA. Visibility: a novel concept for characterising provable network digital evidences. International Journal of Security and Networks 2009; 4(4): 234-245.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 234-245
-
-
Rekhis, S.1
Boudriga, N.A.2
-
62
-
-
68149158275
-
An efficient one-time password authentication scheme using a smart card
-
Lee S, Sivalingam KM. An efficient one-time password authentication scheme using a smart card. International Journal of Security and Networks 2009; 4(3): 145-152.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 145-152
-
-
Lee, S.1
Sivalingam, K.M.2
-
66
-
-
68149180871
-
Intrusion detection system for denial-of-service flooding attacks in SIP communication networks
-
Ehlert S, Rebahi Y, Magedanz T. Intrusion detection system for denial-of-service flooding attacks in SIP communication networks. International Journal of Security and Networks 2009; 4(3): 189-200.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 189-200
-
-
Ehlert, S.1
Rebahi, Y.2
Magedanz, T.3
-
67
-
-
61849085156
-
An evaluation of connection characteristics for separating network attacks
-
Berthier R, Cukier M. An evaluation of connection characteristics for separating network attacks. International Journal of Security and Networks 2009; 4(1/2): 110-124.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 110-124
-
-
Berthier, R.1
Cukier, M.2
-
68
-
-
61849158146
-
An efficient group key management scheme for mobile ad hoc networks
-
Wu B, Wu J, Dong Y. An efficient group key management scheme for mobile ad hoc networks. International Journal of Security and Networks 2009; 4(1/2): 125-134.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 125-134
-
-
Wu, B.1
Wu, J.2
Dong, Y.3
-
70
-
-
61849163799
-
Proximity-based authentication of mobile devices
-
Scannell A, Varshavsky A, LaMarca A, De Lara E. Proximity-based authentication of mobile devices. International Journal of Security and Networks 2009; 4(1/2): 4-16.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 4-16
-
-
Scannell, A.1
Varshavsky, A.2
LaMarca, A.3
De Lara, E.4
-
72
-
-
61849134762
-
Secure pairing with biometrics
-
Buhan I, Boom B, Doumen J, Hartel PH, Veldhuis RNJ. Secure pairing with biometrics. International Journal of Security and Networks 2009; 4(1/2): 27-42.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 27-42
-
-
Buhan, I.1
Boom, B.2
Doumen, J.3
Hartel, P.H.4
Veldhuis, R.N.J.5
-
74
-
-
61849184822
-
Using audio in secure device pairing
-
Goodrich MT, Sirivianos M, Solis J, Soriente C, Tsudik G, Uzun E. Using audio in secure device pairing. International Journal of Security and Networks 2009; 4(1/2): 57-68.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 57-68
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Soriente, C.4
Tsudik, G.5
Uzun, E.6
-
77
-
-
61849158147
-
Designing user studies for security applications: a case study with wireless network configuration
-
Kuo C, Perrig A, Walker J. Designing user studies for security applications: a case study with wireless network configuration. International Journal of Security and Networks 2009; 409(1/2): 101-109.
-
(2009)
International Journal of Security and Networks
, vol.409
, Issue.1-2
, pp. 101-109
-
-
Kuo, C.1
Perrig, A.2
Walker, J.3
-
78
-
-
79551645150
-
An one-way function based framework for pairwise key establishment in sensor networks
-
Ma L, Teymorian AY, Xing K, Du D. An one-way function based framework for pairwise key establishment in sensor networks. International Journal of Security and Networks 2008; 3(4): 217-225.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 217-225
-
-
Ma, L.1
Teymorian, A.Y.2
Xing, K.3
Du, D.4
-
79
-
-
79551628267
-
Clique-based group key assignment in Wireless Sensor Networks
-
Srinivasan A, Li F, Wu J, Li M. Clique-based group key assignment in Wireless Sensor Networks. International Journal of Security and Networks 2008; 3(4): 226-239.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 226-239
-
-
Srinivasan, A.1
Li, F.2
Wu, J.3
Li, M.4
-
80
-
-
77953193668
-
NTP-DownloadT: a conformance test tool for secured mobile download services
-
Hsieh C, Chen J, Lin Y-B, Chen K, Liao H, Liang C. NTP-DownloadT: a conformance test tool for secured mobile download services. International Journal of Security and Networks 2008; 3(4): 240-249.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 240-249
-
-
Hsieh, C.1
Chen, J.2
Lin, Y.-B.3
Chen, K.4
Liao, H.5
Liang, C.6
-
82
-
-
79551651366
-
Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
-
Kandikattu R, Jacob L. Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks. International Journal of Security and Networks 2008; 3(4): 258-274.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 258-274
-
-
Kandikattu, R.1
Jacob, L.2
-
84
-
-
79951637895
-
Firewall filtering rules analysis for anomalies detection
-
Bouhoula A, Trabelsi Z, Barka E, Benelbahri M. Firewall filtering rules analysis for anomalies detection. International Journal of Security and Networks 2008; 3(3): 161-172.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 161-172
-
-
Bouhoula, A.1
Trabelsi, Z.2
Barka, E.3
Benelbahri, M.4
-
85
-
-
77954327354
-
PVFS: a probabilistic votingbbased filtering scheme in wireless sensor networks
-
Li F, Srinivasan A, Wu J. PVFS: a probabilistic votingbbased filtering scheme in wireless sensor networks. International Journal of Security and Networks 2008; 3(3): 173-182.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 173-182
-
-
Li, F.1
Srinivasan, A.2
Wu, J.3
-
87
-
-
72549101766
-
An agent-based framework for intrusion detection alert verification and event correlation
-
Uphoff B, Wong JS. An agent-based framework for intrusion detection alert verification and event correlation. International Journal of Security and Networks 2008; 3(3): 193-200.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 193-200
-
-
Uphoff, B.1
Wong, J.S.2
-
88
-
-
79951661564
-
Secure user-identification and key distribution scheme preserving anonymity
-
Tripathy S, Nandi S. Secure user-identification and key distribution scheme preserving anonymity. International Journal of Security and Networks 2008; 3(3): 201-205.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 201-205
-
-
Tripathy, S.1
Nandi, S.2
-
89
-
-
77952481544
-
ID-based threshold proxy signcryption scheme from bilinear pairings
-
Li F, Xin X, Hu Y. ID-based threshold proxy signcryption scheme from bilinear pairings. International Journal of Security and Networks 2008; 3(3): 206-215.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 206-215
-
-
Li, F.1
Xin, X.2
Hu, Y.3
-
90
-
-
51849141536
-
A novel localised authentication scheme in IEEE 802.11 based wireless mesh networks
-
Lin X, Ling X, Zhu H, Ho P, Shen X. A novel localised authentication scheme in IEEE 802.11 based wireless mesh networks. International Journal of Security and Networks 2008; 3(2): 122-132.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 122-132
-
-
Lin, X.1
Ling, X.2
Zhu, H.3
Ho, P.4
Shen, X.5
-
91
-
-
77953145198
-
Adaptive clustering for scalable key management in dynamic group communications
-
Challal Y, Gharout S, Bouabdallah A, Bettahar H. Adaptive clustering for scalable key management in dynamic group communications. International Journal of Security and Networks 2008; 3(2): 133-146.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 133-146
-
-
Challal, Y.1
Gharout, S.2
Bouabdallah, A.3
Bettahar, H.4
-
93
-
-
77955714466
-
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
-
Ray I, Poolsappasit N. Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. International Journal of Security and Networks 2008; 3(2): 80-94.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 80-94
-
-
Ray, I.1
Poolsappasit, N.2
-
94
-
-
70149104596
-
Forensic analysis of SCADA systems and networks
-
Kilpatrick T, Gonzalez J, Chandia R, Papa M, Shenoi S. Forensic analysis of SCADA systems and networks. International Journal of Security and Networks 2008; 3(2): 95-102.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 95-102
-
-
Kilpatrick, T.1
Gonzalez, J.2
Chandia, R.3
Papa, M.4
Shenoi, S.5
-
97
-
-
73549097586
-
Multilayer key establishment for large-scale sensor networks
-
Kotzanikolaou P, Vergados DD, Stergiou G, Magkos E. Multilayer key establishment for large-scale sensor networks. International Journal of Security and Networks 2008; 3(1): 1-9.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 1-9
-
-
Kotzanikolaou, P.1
Vergados, D.D.2
Stergiou, G.3
Magkos, E.4
-
98
-
-
84899740998
-
Visualisation of wormholes in underwater sensor networks: a distributed approach
-
Wang W, Kong J, Bhargava B, Gerla M. Visualisation of wormholes in underwater sensor networks: a distributed approach. International Journal of Security and Networks 2008; 3(1): 10-23.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 10-23
-
-
Wang, W.1
Kong, J.2
Bhargava, B.3
Gerla, M.4
-
99
-
-
85086420396
-
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
-
Scheirer W, Chuah M. Syntax vs. semantics: competing approaches to dynamic network intrusion detection. International Journal of Security and Networks 2008; 3(1): 24-35.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 24-35
-
-
Scheirer, W.1
Chuah, M.2
-
100
-
-
79951598312
-
Origins: an approach to trace fast spreading worms to their roots
-
Burt AL, Darschewski M, Ray I, Thurimella R, Wu H. Origins: an approach to trace fast spreading worms to their roots. International Journal of Security and Networks 2008; 3(1): 36-46.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 36-46
-
-
Burt, A.L.1
Darschewski, M.2
Ray, I.3
Thurimella, R.4
Wu, H.5
-
101
-
-
79951619296
-
A novel conference key management solution for secure dynamic conferencing
-
Zou X, Karandikar Y. A novel conference key management solution for secure dynamic conferencing. International Journal of Security and Networks 2008; 3(1): 47-53.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 47-53
-
-
Zou, X.1
Karandikar, Y.2
-
103
-
-
79951662876
-
Towards a realistic testbed for wireless network reliability and security performance studies
-
Hu F, Rughoonundon A, Celentano L. Towards a realistic testbed for wireless network reliability and security performance studies. International Journal of Security and Networks 2008; 3(1): 63-77.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 63-77
-
-
Hu, F.1
Rughoonundon, A.2
Celentano, L.3
-
104
-
-
79951639076
-
Editorial
-
Mu Y, Chen L, Chen X, Gong G, Lee P, Miyaji A, et al. Editorial. International Journal of Security and Networks 2007; 2(3/4): 171-174.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 171-174
-
-
Mu, Y.1
Chen, L.2
Chen, X.3
Gong, G.4
Lee, P.5
Miyaji, A.6
-
105
-
-
85016433011
-
Efficient multicast stream authentication for the fully adversarial network model
-
Tartary C, Wang H. Efficient multicast stream authentication for the fully adversarial network model. International Journal of Security and Networks 2007; 2(3/4): 175-191.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 175-191
-
-
Tartary, C.1
Wang, H.2
-
107
-
-
79951648076
-
LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
-
Hsu H, Zhu S, Hurson AR. LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. International Journal of Security and Networks 2007; 2(3/4): 202-215.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 202-215
-
-
Hsu, H.1
Zhu, S.2
Hurson, A.R.3
-
108
-
-
34548042117
-
On the design of secure protocols for hierarchical sensor networks
-
Oliveira LB, Wong H, Loureiro AAF, Dahab R. On the design of secure protocols for hierarchical sensor networks. International Journal of Security and Networks 2007; 2(3/4): 216-227.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 216-227
-
-
Oliveira, L.B.1
Wong, H.2
Loureiro, A.A.F.3
Dahab, R.4
-
109
-
-
79951645452
-
Server side hashing core exceeding 3Gbps of throughput
-
Michail HE, Panagiotakopoulos GA, Thanasoulis VN, Kakarountas AP, Goutis CE. Server side hashing core exceeding 3Gbps of throughput. International Journal of Security and Networks 2007; 2(3/4): 228-238.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 228-238
-
-
Michail, H.E.1
Panagiotakopoulos, G.A.2
Thanasoulis, V.N.3
Kakarountas, A.P.4
Goutis, C.E.5
-
110
-
-
68149086398
-
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
-
Hoeper K, Gong G. Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4): 239-250.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 239-250
-
-
Hoeper, K.1
Gong, G.2
-
111
-
-
38049042723
-
On security proof of McCullagh-Barreto's key agreement protocol and its variants
-
Cheng Z, Chen L. On security proof of McCullagh-Barreto's key agreement protocol and its variants. International Journal of Security and Networks 2007; 2(3/4): 251-259.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 251-259
-
-
Cheng, Z.1
Chen, L.2
-
112
-
-
77949415724
-
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
-
Finnigin KM, Mullins BE, Raines RA, Potoczny HB. Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks. International Journal of Security and Networks 2007; 2(3/4): 260-271.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 260-271
-
-
Finnigin, K.M.1
Mullins, B.E.2
Raines, R.A.3
Potoczny, H.B.4
-
113
-
-
66249092571
-
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
-
Huang D. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4): 272-283.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 272-283
-
-
Huang, D.1
-
114
-
-
79951638712
-
Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol
-
Abdalla M, Bresson E, Chevassut O, Moller B, Pointcheval D. Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol. International Journal of Security and Networks 2007; 2(3/4): 284-296.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 284-296
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Moller, B.4
Pointcheval, D.5
-
116
-
-
79551652560
-
DKMS: distributed hierarchical access control for multimedia networks
-
Li R, Li J, Chen H. DKMS: distributed hierarchical access control for multimedia networks. International Journal of Security and Networks 2007; 2(1/2): 3-10.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 3-10
-
-
Li, R.1
Li, J.2
Chen, H.3
-
118
-
-
74549116861
-
Securing Wi-Fi networks with position verification: extended version
-
Malaney RA. Securing Wi-Fi networks with position verification: extended version. International Journal of Security and Networks 2007; 2(1/2): 27-36.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 27-36
-
-
Malaney, R.A.1
-
120
-
-
74049111426
-
Hash-AV: fast virus signature scanning by cache-resident filters
-
Erdogan Oz, Cao P. Hash-AV: fast virus signature scanning by cache-resident filters. International Journal of Security and Networks 2007; 2(1/2): 50-59.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 50-59
-
-
Erdogan, O.1
Cao, P.2
-
121
-
-
79551643767
-
Secure message delivery in publish/subscribe networks using overlay multicast
-
Rabinovich P, Simon R. Secure message delivery in publish/subscribe networks using overlay multicast. International Journal of Security and Networks 2007; 2(1/2): 60-70.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 60-70
-
-
Rabinovich, P.1
Simon, R.2
-
122
-
-
34548366188
-
Optimal worm-scanning method using vulnerable-host distributions
-
Chen Z, Ji C. Optimal worm-scanning method using vulnerable-host distributions. International Journal of Security and Networks 2007; 2(1/2): 71-80.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 71-80
-
-
Chen, Z.1
Ji, C.2
-
124
-
-
34547148771
-
8 Single packet IP traceback in AS-level partial deployment scenario
-
Korkmaz T, Gong C, Sarac K, Dykes SG. 8 Single packet IP traceback in AS-level partial deployment scenario. International Journal of Security and Networks 2007; 2(1/2): 95-10.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 95-10
-
-
Korkmaz, T.1
Gong, C.2
Sarac, K.3
Dykes, S.G.4
-
125
-
-
79551646922
-
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
-
Ling H, Znati T. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. International Journal of Security and Networks 2007; 2(1/2): 109-121.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 109-121
-
-
Ling, H.1
Znati, T.2
-
127
-
-
79551551587
-
Analysis of flow-correlation attacks in anonymity network
-
Zhu Y, Fu X, Bettati R, Zhao W. Analysis of flow-correlation attacks in anonymity network. International Journal of Security and Networks 2007; 2(1/2): 137-153.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 137-153
-
-
Zhu, Y.1
Fu, X.2
Bettati, R.3
Zhao, W.4
-
128
-
-
74549177130
-
Defence against packet injection in ad hoc networks
-
Gu Q, Liu P, Chu C, Zhu S. Defence against packet injection in ad hoc networks. International Journal of Security and Networks 2007; 2(1/2): 154-169.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 154-169
-
-
Gu, Q.1
Liu, P.2
Chu, C.3
Zhu, S.4
-
129
-
-
37849002205
-
End-to-end security mechanisms for SMS
-
Hwu J, Hsu S, Lin Y-B, Chen R. End-to-end security mechanisms for SMS. International Journal of Security and Networks 2006; 1(3/4): 177-183.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 177-183
-
-
Hwu, J.1
Hsu, S.2
Lin, Y.-B.3
Chen, R.4
-
130
-
-
77955716028
-
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
-
Wang X. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. International Journal of Security and Networks 2006; 1(3/4): 184-197.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 184-197
-
-
Wang, X.1
-
131
-
-
51249122792
-
A self-encryption authentication protocol for teleconference services
-
Jiang Y, Lin C, Shi M, Shen X. A self-encryption authentication protocol for teleconference services. International Journal of Security and Networks 2006; 1(3/4): 198-205.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 198-205
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.4
-
134
-
-
79951716783
-
Low-power authenticated group key agreement for heterogeneous wireless networks
-
Teo J, Tan C, Ng J. Low-power authenticated group key agreement for heterogeneous wireless networks. International Journal of Security and Networks 2006; 1(3/4): 226-236.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 226-236
-
-
Teo, J.1
Tan, C.2
Ng, J.3
-
135
-
-
77954644745
-
A new signature scheme without random oracles
-
Tan C. A new signature scheme without random oracles. International Journal of Security and Networks 2006; 1(3/4): 237-242.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 237-242
-
-
Tan, C.1
-
136
-
-
67649498303
-
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
-
Liu Y, Comaniciu C, Man H. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. International Journal of Security and Networks 2006; 1(3/4): 243-254.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 243-254
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
137
-
-
44649095872
-
A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks
-
Karyotis V, Papavassiliou S, Grammatikou M, Maglaris V. A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks. International Journal of Security and Networks 2006; 1(3/4): 255-265.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 255-265
-
-
Karyotis, V.1
Papavassiliou, S.2
Grammatikou, M.3
Maglaris, V.4
-
138
-
-
79951685922
-
Editorial: security issues on sensor networks
-
Xiao Y, Jia X, Sun B, Du X. Editorial: security issues on sensor networks. International Journal of Security and Networks 2006; 1(3/4): 125-126.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 125-126
-
-
Xiao, Y.1
Jia, X.2
Sun, B.3
Du, X.4
-
140
-
-
79955980141
-
A lightweight encryption and authentication scheme for wireless sensor networks
-
Zheng J, Li J, Lee MJ, Anshel M. A lightweight encryption and authentication scheme for wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4): 138-146.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 138-146
-
-
Zheng, J.1
Li, J.2
Lee, M.J.3
Anshel, M.4
-
141
-
-
79951694028
-
Analysis of routing security-energy trade-offs in wireless sensor networks
-
Al-Karaki JN. Analysis of routing security-energy trade-offs in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4): 147-157.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 147-157
-
-
Al-Karaki, J.N.1
-
142
-
-
49949107235
-
Load-balanced key establishment methodologies in wireless sensor networks
-
Araz O, Qi H. Load-balanced key establishment methodologies in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4): 158-166.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 158-166
-
-
Araz, O.1
Qi, H.2
-
143
-
-
84890880165
-
Limiting DoS attacks during multihop data delivery in wireless sensor networks
-
Deng J, Han R, Mishra S. Limiting DoS attacks during multihop data delivery in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4): 167-178.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 167-178
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
147
-
-
54249117650
-
Secure scalable group signature with dynamic joins and separable authorities
-
Kiayias A, Yung M. Secure scalable group signature with dynamic joins and separable authorities. International Journal of Security and Networks 2006; 1(1/2): 24-45.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 24-45
-
-
Kiayias, A.1
Yung, M.2
-
150
-
-
77954341184
-
An approach to synthesise safe systems
-
Jhumka A, Freiling F, Fetzer C, Suri N. An approach to synthesise safe systems. International Journal of Security and Networks 2006; 1(1/2): 62-74.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 62-74
-
-
Jhumka, A.1
Freiling, F.2
Fetzer, C.3
Suri, N.4
-
151
-
-
74549166520
-
Wireless networking security: open issues in trust, management, interoperation and measurement
-
Evans JB, Wang W, Ewy BJ. Wireless networking security: open issues in trust, management, interoperation and measurement. International Journal of Security and Networks 2006; 1(1/2): 84-94.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 84-94
-
-
Evans, J.B.1
Wang, W.2
Ewy, B.J.3
-
152
-
-
72449209394
-
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
-
Englund H, Johansson T. Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. International Journal of Security and Networks 2006; 1(1/2): 95-102.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 95-102
-
-
Englund, H.1
Johansson, T.2
-
155
-
-
84947617553
-
-
Joint SEE-Mesh/Wi-Mesh Proposal to 802.11 TGs, IEEE published documents, doc.: IEEE 802.11-06/0328r0
-
Joint SEE-Mesh/Wi-Mesh Proposal to 802.11 TGs, IEEE published documents, doc.: IEEE 802.11-06/0328r0
-
-
-
-
156
-
-
84947617638
-
-
AirPcap interface documentation. Available from:
-
AirPcap interface documentation. Available from:
-
-
-
|