메뉴 건너뛰기




Volumn 5, Issue 1, 2012, Pages 29-49

Accountability using flow-net: Design, implementation, and performance evaluation

Author keywords

Accountability; Logging; Media access control (MAC); Routing; Trace; Wireless networks

Indexed keywords

LOGGING (FORESTRY); MEDIUM ACCESS CONTROL; WIRELESS NETWORKS;

EID: 84255195594     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.348     Document Type: Article
Times cited : (25)

References (157)
  • 1
    • 70350060199 scopus 로고    scopus 로고
    • Flow-net methodology for accountability in wireless networks
    • Xiao Y. Flow-net methodology for accountability in wireless networks. IEEE Network 2009; 23(5): 30-37.
    • (2009) IEEE Network , vol.23 , Issue.5 , pp. 30-37
    • Xiao, Y.1
  • 2
    • 33746368048 scopus 로고    scopus 로고
    • Enhancing security using mobility-based anomaly detection in cellular mobile networks
    • Sun B, Yu F, Wu K, Xiao Y, Leung VCM. Enhancing security using mobility-based anomaly detection in cellular mobile networks. IEEE Transactions on Vehicular Technology 2006; 55(4): 1385-1396.
    • (2006) IEEE Transactions on Vehicular Technology , vol.55 , Issue.4 , pp. 1385-1396
    • Sun, B.1    Yu, F.2    Wu, K.3    Xiao, Y.4    Leung, V.C.M.5
  • 3
    • 33745689203 scopus 로고    scopus 로고
    • Accountability in electronic commerce protocols
    • Kailar R. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering 1996; 22(5): 313-328.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.5 , pp. 313-328
    • Kailar, R.1
  • 6
    • 4143113268 scopus 로고    scopus 로고
    • Fine-grain access control for securing shared resources in computational grids. In Proc. of IPDPS
    • Butt AR, Adabala S, Kapadia NH, Figueiredo R, Fortes JAB. Fine-grain access control for securing shared resources in computational grids. In Proc. of IPDPS, 2002.
    • (2002)
    • Butt, A.R.1    Adabala, S.2    Kapadia, N.H.3    Figueiredo, R.4    Fortes, J.A.B.5
  • 8
    • 0039334688 scopus 로고    scopus 로고
    • The security architecture formerly known as stack inspection: a security mechanism for language-based systems
    • Oct
    • Wallach DS, Appel AW, Felten EW. The security architecture formerly known as stack inspection: a security mechanism for language-based systems. ACM Transactions on Software Engineering and Methodology Oct. 2000; 9(4): 341-378.
    • (2000) ACM Transactions on Software Engineering and Methodology , vol.9 , Issue.4 , pp. 341-378
    • Wallach, D.S.1    Appel, A.W.2    Felten, E.W.3
  • 9
    • 84255197330 scopus 로고    scopus 로고
    • Implementing copyright limitations in rights expression languages. In 2002 ACM Workshop on Digital Rights Management, Washington DC, 18 November
    • Mulligan DK, Burstein A. Implementing copyright limitations in rights expression languages. In 2002 ACM Workshop on Digital Rights Management, Washington DC, 18 November 2002.
    • (2002)
    • Mulligan, D.K.1    Burstein, A.2
  • 10
    • 1942433797 scopus 로고    scopus 로고
    • Digital rights management {and, or, vs.} the law
    • Samuelson P. Digital rights management {and, or, vs.} the law. Communications of the ACM 2003; 46(4): 41-45.
    • (2003) Communications of the ACM , vol.46 , Issue.4 , pp. 41-45
    • Samuelson, P.1
  • 11
    • 0027668428 scopus 로고
    • Statistical foundations of audit trail analysis for the detection of computer misuse
    • Helman P, Liepins G. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Transactions on Software Engineering 1993; 19(9): 886-901.
    • (1993) IEEE Transactions on Software Engineering , vol.19 , Issue.9 , pp. 886-901
    • Helman, P.1    Liepins, G.2
  • 13
    • 84947616842 scopus 로고    scopus 로고
  • 14
    • 79951647755 scopus 로고    scopus 로고
    • Implementation and evaluation of accountability using flow-net in wireless networks. Proceedings of the IEEE Military Communications Conference 2010 (IEEE MILCOM 2010), 31 Oct.-3 Nov
    • Xiao Y, Meng K, Takahashi D. Implementation and evaluation of accountability using flow-net in wireless networks. Proceedings of the IEEE Military Communications Conference 2010 (IEEE MILCOM 2010), 31 Oct.-3 Nov. 2010.
    • (2010)
    • Xiao, Y.1    Meng, K.2    Takahashi, D.3
  • 15
    • 84947615746 scopus 로고    scopus 로고
    • Temporal accountability and anonymity in medical sensor networks. ACM/Springer Mobile Networks and Applications (MONET), Special issue on Ubiquitous Body Sensor Networks, accepted.
    • Liu J, Xiao Y. Temporal accountability and anonymity in medical sensor networks. ACM/Springer Mobile Networks and Applications (MONET), Special issue on Ubiquitous Body Sensor Networks, accepted.
    • Liu, J.1    Xiao, Y.2
  • 16
    • 42649088128 scopus 로고    scopus 로고
    • Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
    • special issue on Security in Mobile Ad Hoc and Sensor Networks, Doi: 10.1109/MCOM.2008.4481350
    • Xiao Y. Accountability for wireless LANs, ad hoc networks, and wireless mesh networks. IEEE Communication Magazine, special issue on Security in Mobile Ad Hoc and Sensor Networks 2008; 46(4): 116-126. Doi: 10.1109/MCOM.2008.4481350
    • (2008) IEEE Communication Magazine , vol.46 , Issue.4 , pp. 116-126
    • Xiao, Y.1
  • 17
    • 70350068836 scopus 로고    scopus 로고
    • Retrieving knowledge from auditing log files for computer and network forensics and accountability
    • Takahashi D, Xiao Y. Retrieving knowledge from auditing log files for computer and network forensics and accountability. Security and Communication Networks 2008; 1(2): 147-160.
    • (2008) Security and Communication Networks , vol.1 , Issue.2 , pp. 147-160
    • Takahashi, D.1    Xiao, Y.2
  • 18
    • 79957925781 scopus 로고    scopus 로고
    • Accountability in Smart Grids. Proceedings of IEEE Consumer Communications and Networking Conference 2011 (IEEE CCNC 2011), Smart Grids Special Session, accepted.
    • Liu J, Xiao Y, Gao J. Accountability in Smart Grids. Proceedings of IEEE Consumer Communications and Networking Conference 2011 (IEEE CCNC 2011), Smart Grids Special Session, accepted.
    • Liu, J.1    Xiao, Y.2    Gao, J.3
  • 19
    • 78649625552 scopus 로고    scopus 로고
    • A Quantitative Study of Accountability in Wireless Multi-hop Networks. Proceedings of 2010 39th International Conference on Parallel Processing (ICPP 2010), 13-16 Sept
    • Xiao Z, Xiao Y, Wu J. A Quantitative Study of Accountability in Wireless Multi-hop Networks. Proceedings of 2010 39th International Conference on Parallel Processing (ICPP 2010), 13-16 Sept. 2010.
    • (2010)
    • Xiao, Z.1    Xiao, Y.2    Wu, J.3
  • 21
    • 77953884604 scopus 로고    scopus 로고
    • P-accountable networked systems. Proceeding of INFOCOM 2010, Work in Progress (WIP) Track.
    • Xiao Z, Xiao Y. P-accountable networked systems. Proceeding of INFOCOM 2010, Work in Progress (WIP) Track.
    • Xiao, Z.1    Xiao, Y.2
  • 26
    • 79954614519 scopus 로고    scopus 로고
    • Secure and privacy-preserving information aggregation for smart grids
    • Li F, Luo B, Liu P. Secure and privacy-preserving information aggregation for smart grids. International Journal of Security and Networks 2011; 6(1): 28-39.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.1 , pp. 28-39
    • Li, F.1    Luo, B.2    Liu, P.3
  • 33
    • 77949732329 scopus 로고    scopus 로고
    • Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
    • Guo H, Mu Y, Zhang XY, Li ZJ. Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security. International Journal of Security and Networks 2010; 5(2/3): 173-187.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 173-187
    • Guo, H.1    Mu, Y.2    Zhang, X.Y.3    Li, Z.J.4
  • 38
    • 77949692385 scopus 로고    scopus 로고
    • Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees
    • Dalton GC, II, Edge KS, Mills RF, Raines RA. Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees. International Journal of Security and Networks 2010; 5(2/3): 87-95.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 87-95
    • Dalton II, G.C.1    Edge, K.S.2    Mills, R.F.3    Raines, R.A.4
  • 42
    • 77949694146 scopus 로고    scopus 로고
    • Security and privacy on low-cost radio frequency identification systems
    • Sun L. Security and privacy on low-cost radio frequency identification systems. International Journal of Security and Networks 2010; 5(2/3): 128-134.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 128-134
    • Sun, L.1
  • 44
    • 77949765113 scopus 로고    scopus 로고
    • Radio frequency identification: a case study of healthcare organisations
    • Azevedo SG, Ferreira JJ. Radio frequency identification: a case study of healthcare organisations. International Journal of Security and Networks 2010; 5(2/3): 147-155.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 147-155
    • Azevedo, S.G.1    Ferreira, J.J.2
  • 45
    • 77949750049 scopus 로고    scopus 로고
    • A ubiquitous mobile telemedicine system for the elderly using RFID
    • Raad M. A ubiquitous mobile telemedicine system for the elderly using RFID. International Journal of Security and Networks 2010; 5(2/3): 156-164.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 156-164
    • Raad, M.1
  • 46
    • 77949666177 scopus 로고    scopus 로고
    • Perceived barriers to the widespread commercial use of radio frequency identification technology
    • Rodrigues MJ, James K. Perceived barriers to the widespread commercial use of radio frequency identification technology. International Journal of Security and Networks 2010; 5(2/3): 165-172.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 165-172
    • Rodrigues, M.J.1    James, K.2
  • 48
    • 77949837905 scopus 로고    scopus 로고
    • A backpressure technique for filtering spoofed traffic at upstream routers
    • Malliga S, Tamilarasi A. A backpressure technique for filtering spoofed traffic at upstream routers. International Journal of Security and Networks 2010; 5(1): 3-14.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 3-14
    • Malliga, S.1    Tamilarasi, A.2
  • 49
    • 77949801623 scopus 로고    scopus 로고
    • Authentication and secret search mechanisms for RFID-aware wireless sensor networks
    • Huang S, Shieh S. Authentication and secret search mechanisms for RFID-aware wireless sensor networks. International Journal of Security and Networks 2010; 5(1): 15-25.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 15-25
    • Huang, S.1    Shieh, S.2
  • 50
    • 77949844099 scopus 로고    scopus 로고
    • An efficient secure data dissemination scheme for grid structure wireless sensor networks
    • Hsiao Y, Hwang R. An efficient secure data dissemination scheme for grid structure wireless sensor networks. International Journal of Security and Networks 2010; 5(1): 26-34.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 26-34
    • Hsiao, Y.1    Hwang, R.2
  • 51
    • 77949835881 scopus 로고    scopus 로고
    • Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
    • Xu L, Chen S, Huang X, Mu Y. Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks. International Journal of Security and Networks 2010; 5(1): 35-44.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 35-44
    • Xu, L.1    Chen, S.2    Huang, X.3    Mu, Y.4
  • 52
    • 77949817850 scopus 로고    scopus 로고
    • Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
    • Tsai K, Hsu C, Wu T. Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks. International Journal of Security and Networks 2010; 5(1): 45-52.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 45-52
    • Tsai, K.1    Hsu, C.2    Wu, T.3
  • 53
    • 77949864345 scopus 로고    scopus 로고
    • Lightweight authentication protocol for mobile RFID networks
    • Yang M. Lightweight authentication protocol for mobile RFID networks. International Journal of Security and Networks 2010; 5(1): 53-62.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 53-62
    • Yang, M.1
  • 54
    • 77949830969 scopus 로고    scopus 로고
    • A cross-layer authentication design for secure video transportation in wireless sensor network
    • Wang J, Smith GL. A cross-layer authentication design for secure video transportation in wireless sensor network. International Journal of Security and Networks 2010; 5(1): 63-76.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 63-76
    • Wang, J.1    Smith, G.L.2
  • 55
    • 70349969846 scopus 로고    scopus 로고
    • A proactive secret sharing scheme in matrix projection method
    • Bai L, Zou X. A proactive secret sharing scheme in matrix projection method. International Journal of Security and Networks 2009; 4(4): 201-209.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 201-209
    • Bai, L.1    Zou, X.2
  • 57
  • 58
    • 70349949111 scopus 로고    scopus 로고
    • Visibility: a novel concept for characterising provable network digital evidences
    • Rekhis S, Boudriga NA. Visibility: a novel concept for characterising provable network digital evidences. International Journal of Security and Networks 2009; 4(4): 234-245.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 234-245
    • Rekhis, S.1    Boudriga, N.A.2
  • 60
    • 70349968010 scopus 로고    scopus 로고
    • Attacks and countermeasures in multi-hop cognitive radio networks
    • Hu F, Dong D, Xiao Y. Attacks and countermeasures in multi-hop cognitive radio networks. International Journal of Security and Networks 2009; 4(4): 263-271.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 263-271
    • Hu, F.1    Dong, D.2    Xiao, Y.3
  • 62
    • 68149158275 scopus 로고    scopus 로고
    • An efficient one-time password authentication scheme using a smart card
    • Lee S, Sivalingam KM. An efficient one-time password authentication scheme using a smart card. International Journal of Security and Networks 2009; 4(3): 145-152.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 145-152
    • Lee, S.1    Sivalingam, K.M.2
  • 66
    • 68149180871 scopus 로고    scopus 로고
    • Intrusion detection system for denial-of-service flooding attacks in SIP communication networks
    • Ehlert S, Rebahi Y, Magedanz T. Intrusion detection system for denial-of-service flooding attacks in SIP communication networks. International Journal of Security and Networks 2009; 4(3): 189-200.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 189-200
    • Ehlert, S.1    Rebahi, Y.2    Magedanz, T.3
  • 67
    • 61849085156 scopus 로고    scopus 로고
    • An evaluation of connection characteristics for separating network attacks
    • Berthier R, Cukier M. An evaluation of connection characteristics for separating network attacks. International Journal of Security and Networks 2009; 4(1/2): 110-124.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 110-124
    • Berthier, R.1    Cukier, M.2
  • 68
    • 61849158146 scopus 로고    scopus 로고
    • An efficient group key management scheme for mobile ad hoc networks
    • Wu B, Wu J, Dong Y. An efficient group key management scheme for mobile ad hoc networks. International Journal of Security and Networks 2009; 4(1/2): 125-134.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 125-134
    • Wu, B.1    Wu, J.2    Dong, Y.3
  • 77
    • 61849158147 scopus 로고    scopus 로고
    • Designing user studies for security applications: a case study with wireless network configuration
    • Kuo C, Perrig A, Walker J. Designing user studies for security applications: a case study with wireless network configuration. International Journal of Security and Networks 2009; 409(1/2): 101-109.
    • (2009) International Journal of Security and Networks , vol.409 , Issue.1-2 , pp. 101-109
    • Kuo, C.1    Perrig, A.2    Walker, J.3
  • 78
    • 79551645150 scopus 로고    scopus 로고
    • An one-way function based framework for pairwise key establishment in sensor networks
    • Ma L, Teymorian AY, Xing K, Du D. An one-way function based framework for pairwise key establishment in sensor networks. International Journal of Security and Networks 2008; 3(4): 217-225.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.4 , pp. 217-225
    • Ma, L.1    Teymorian, A.Y.2    Xing, K.3    Du, D.4
  • 82
    • 79551651366 scopus 로고    scopus 로고
    • Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
    • Kandikattu R, Jacob L. Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks. International Journal of Security and Networks 2008; 3(4): 258-274.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.4 , pp. 258-274
    • Kandikattu, R.1    Jacob, L.2
  • 85
    • 77954327354 scopus 로고    scopus 로고
    • PVFS: a probabilistic votingbbased filtering scheme in wireless sensor networks
    • Li F, Srinivasan A, Wu J. PVFS: a probabilistic votingbbased filtering scheme in wireless sensor networks. International Journal of Security and Networks 2008; 3(3): 173-182.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 173-182
    • Li, F.1    Srinivasan, A.2    Wu, J.3
  • 87
    • 72549101766 scopus 로고    scopus 로고
    • An agent-based framework for intrusion detection alert verification and event correlation
    • Uphoff B, Wong JS. An agent-based framework for intrusion detection alert verification and event correlation. International Journal of Security and Networks 2008; 3(3): 193-200.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 193-200
    • Uphoff, B.1    Wong, J.S.2
  • 88
    • 79951661564 scopus 로고    scopus 로고
    • Secure user-identification and key distribution scheme preserving anonymity
    • Tripathy S, Nandi S. Secure user-identification and key distribution scheme preserving anonymity. International Journal of Security and Networks 2008; 3(3): 201-205.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 201-205
    • Tripathy, S.1    Nandi, S.2
  • 89
    • 77952481544 scopus 로고    scopus 로고
    • ID-based threshold proxy signcryption scheme from bilinear pairings
    • Li F, Xin X, Hu Y. ID-based threshold proxy signcryption scheme from bilinear pairings. International Journal of Security and Networks 2008; 3(3): 206-215.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 206-215
    • Li, F.1    Xin, X.2    Hu, Y.3
  • 90
  • 93
    • 77955714466 scopus 로고    scopus 로고
    • Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
    • Ray I, Poolsappasit N. Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. International Journal of Security and Networks 2008; 3(2): 80-94.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 80-94
    • Ray, I.1    Poolsappasit, N.2
  • 99
    • 85086420396 scopus 로고    scopus 로고
    • Syntax vs. semantics: competing approaches to dynamic network intrusion detection
    • Scheirer W, Chuah M. Syntax vs. semantics: competing approaches to dynamic network intrusion detection. International Journal of Security and Networks 2008; 3(1): 24-35.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 24-35
    • Scheirer, W.1    Chuah, M.2
  • 101
    • 79951619296 scopus 로고    scopus 로고
    • A novel conference key management solution for secure dynamic conferencing
    • Zou X, Karandikar Y. A novel conference key management solution for secure dynamic conferencing. International Journal of Security and Networks 2008; 3(1): 47-53.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 47-53
    • Zou, X.1    Karandikar, Y.2
  • 103
    • 79951662876 scopus 로고    scopus 로고
    • Towards a realistic testbed for wireless network reliability and security performance studies
    • Hu F, Rughoonundon A, Celentano L. Towards a realistic testbed for wireless network reliability and security performance studies. International Journal of Security and Networks 2008; 3(1): 63-77.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 63-77
    • Hu, F.1    Rughoonundon, A.2    Celentano, L.3
  • 105
    • 85016433011 scopus 로고    scopus 로고
    • Efficient multicast stream authentication for the fully adversarial network model
    • Tartary C, Wang H. Efficient multicast stream authentication for the fully adversarial network model. International Journal of Security and Networks 2007; 2(3/4): 175-191.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 175-191
    • Tartary, C.1    Wang, H.2
  • 107
    • 79951648076 scopus 로고    scopus 로고
    • LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
    • Hsu H, Zhu S, Hurson AR. LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. International Journal of Security and Networks 2007; 2(3/4): 202-215.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 202-215
    • Hsu, H.1    Zhu, S.2    Hurson, A.R.3
  • 110
    • 68149086398 scopus 로고    scopus 로고
    • Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
    • Hoeper K, Gong G. Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4): 239-250.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 239-250
    • Hoeper, K.1    Gong, G.2
  • 111
    • 38049042723 scopus 로고    scopus 로고
    • On security proof of McCullagh-Barreto's key agreement protocol and its variants
    • Cheng Z, Chen L. On security proof of McCullagh-Barreto's key agreement protocol and its variants. International Journal of Security and Networks 2007; 2(3/4): 251-259.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 251-259
    • Cheng, Z.1    Chen, L.2
  • 113
    • 66249092571 scopus 로고    scopus 로고
    • Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
    • Huang D. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4): 272-283.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 272-283
    • Huang, D.1
  • 116
    • 79551652560 scopus 로고    scopus 로고
    • DKMS: distributed hierarchical access control for multimedia networks
    • Li R, Li J, Chen H. DKMS: distributed hierarchical access control for multimedia networks. International Journal of Security and Networks 2007; 2(1/2): 3-10.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 3-10
    • Li, R.1    Li, J.2    Chen, H.3
  • 118
    • 74549116861 scopus 로고    scopus 로고
    • Securing Wi-Fi networks with position verification: extended version
    • Malaney RA. Securing Wi-Fi networks with position verification: extended version. International Journal of Security and Networks 2007; 2(1/2): 27-36.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 27-36
    • Malaney, R.A.1
  • 120
    • 74049111426 scopus 로고    scopus 로고
    • Hash-AV: fast virus signature scanning by cache-resident filters
    • Erdogan Oz, Cao P. Hash-AV: fast virus signature scanning by cache-resident filters. International Journal of Security and Networks 2007; 2(1/2): 50-59.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 50-59
    • Erdogan, O.1    Cao, P.2
  • 121
    • 79551643767 scopus 로고    scopus 로고
    • Secure message delivery in publish/subscribe networks using overlay multicast
    • Rabinovich P, Simon R. Secure message delivery in publish/subscribe networks using overlay multicast. International Journal of Security and Networks 2007; 2(1/2): 60-70.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 60-70
    • Rabinovich, P.1    Simon, R.2
  • 122
    • 34548366188 scopus 로고    scopus 로고
    • Optimal worm-scanning method using vulnerable-host distributions
    • Chen Z, Ji C. Optimal worm-scanning method using vulnerable-host distributions. International Journal of Security and Networks 2007; 2(1/2): 71-80.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 71-80
    • Chen, Z.1    Ji, C.2
  • 125
    • 79551646922 scopus 로고    scopus 로고
    • End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
    • Ling H, Znati T. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. International Journal of Security and Networks 2007; 2(1/2): 109-121.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 109-121
    • Ling, H.1    Znati, T.2
  • 126
    • 39349109602 scopus 로고    scopus 로고
    • Design and analysis of a multipacket signature detection system
    • Artan NS, Chao HJ. Design and analysis of a multipacket signature detection system. International Journal of Security and Networks 2007; 2(1/2): 122-136.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 122-136
    • Artan, N.S.1    Chao, H.J.2
  • 130
    • 77955716028 scopus 로고    scopus 로고
    • The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
    • Wang X. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. International Journal of Security and Networks 2006; 1(3/4): 184-197.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 184-197
    • Wang, X.1
  • 134
    • 79951716783 scopus 로고    scopus 로고
    • Low-power authenticated group key agreement for heterogeneous wireless networks
    • Teo J, Tan C, Ng J. Low-power authenticated group key agreement for heterogeneous wireless networks. International Journal of Security and Networks 2006; 1(3/4): 226-236.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 226-236
    • Teo, J.1    Tan, C.2    Ng, J.3
  • 135
    • 77954644745 scopus 로고    scopus 로고
    • A new signature scheme without random oracles
    • Tan C. A new signature scheme without random oracles. International Journal of Security and Networks 2006; 1(3/4): 237-242.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 237-242
    • Tan, C.1
  • 136
    • 67649498303 scopus 로고    scopus 로고
    • Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
    • Liu Y, Comaniciu C, Man H. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. International Journal of Security and Networks 2006; 1(3/4): 243-254.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 243-254
    • Liu, Y.1    Comaniciu, C.2    Man, H.3
  • 140
  • 141
    • 79951694028 scopus 로고    scopus 로고
    • Analysis of routing security-energy trade-offs in wireless sensor networks
    • Al-Karaki JN. Analysis of routing security-energy trade-offs in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4): 147-157.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 147-157
    • Al-Karaki, J.N.1
  • 142
    • 49949107235 scopus 로고    scopus 로고
    • Load-balanced key establishment methodologies in wireless sensor networks
    • Araz O, Qi H. Load-balanced key establishment methodologies in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4): 158-166.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 158-166
    • Araz, O.1    Qi, H.2
  • 143
    • 84890880165 scopus 로고    scopus 로고
    • Limiting DoS attacks during multihop data delivery in wireless sensor networks
    • Deng J, Han R, Mishra S. Limiting DoS attacks during multihop data delivery in wireless sensor networks. International Journal of Security and Networks 2006; 1(3/4): 167-178.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 167-178
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 147
    • 54249117650 scopus 로고    scopus 로고
    • Secure scalable group signature with dynamic joins and separable authorities
    • Kiayias A, Yung M. Secure scalable group signature with dynamic joins and separable authorities. International Journal of Security and Networks 2006; 1(1/2): 24-45.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 24-45
    • Kiayias, A.1    Yung, M.2
  • 151
    • 74549166520 scopus 로고    scopus 로고
    • Wireless networking security: open issues in trust, management, interoperation and measurement
    • Evans JB, Wang W, Ewy BJ. Wireless networking security: open issues in trust, management, interoperation and measurement. International Journal of Security and Networks 2006; 1(1/2): 84-94.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 84-94
    • Evans, J.B.1    Wang, W.2    Ewy, B.J.3
  • 152
    • 72449209394 scopus 로고    scopus 로고
    • Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
    • Englund H, Johansson T. Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. International Journal of Security and Networks 2006; 1(1/2): 95-102.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 95-102
    • Englund, H.1    Johansson, T.2
  • 155
    • 84947617553 scopus 로고    scopus 로고
    • Joint SEE-Mesh/Wi-Mesh Proposal to 802.11 TGs, IEEE published documents, doc.: IEEE 802.11-06/0328r0
    • Joint SEE-Mesh/Wi-Mesh Proposal to 802.11 TGs, IEEE published documents, doc.: IEEE 802.11-06/0328r0
  • 156
    • 84947617638 scopus 로고    scopus 로고
    • AirPcap interface documentation. Available from:
    • AirPcap interface documentation. Available from:


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.