-
1
-
-
70350060199
-
Flow-net methodology for accountability in wireless networks
-
Sept./Oct.
-
Xiao Y. Flow-net methodology for accountability in wireless networks. IEEE Network Sept./Oct. 2009; 23(5): 30-37.
-
(2009)
IEEE Network
, vol.23
, Issue.5
, pp. 30-37
-
-
Xiao, Y.1
-
3
-
-
33746368048
-
Enhancing security using mobility-based anomaly detection in cellular mobile networks
-
July
-
Sun B, Yu F, Wu K, Xiao Y, Leung VCM. Enhancing security using mobility-based anomaly detection in cellular mobile networks. IEEE Transactions on Vehicular Technology July 2006; 55(4): 1385-1396.
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.4
, pp. 1385-1396
-
-
Sun, B.1
Yu, F.2
Wu, K.3
Xiao, Y.4
Leung, V.C.M.5
-
5
-
-
42649088128
-
Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
-
Apr.
-
Xiao Y. Accountability for wireless LANs, ad hoc networks, and wireless mesh networks. IEEE Communication Magazine, special issue on Security in Mobile Ad Hoc and Sensor Networks Apr. 2008; 46(4): 116-126.
-
(2008)
IEEE Communication Magazine, special issue on Security in Mobile Ad Hoc and Sensor Networks
, vol.46
, Issue.4
, pp. 116-126
-
-
Xiao, Y.1
-
8
-
-
41149122088
-
The role of accountability in dependable distributed systems
-
Jun
-
Yumerefendi AR and Chase JS. The role of accountability in dependable distributed systems. In Proceedings of HotDep, Jun 2005.
-
(2005)
roceedings of HotDep
-
-
Yumerefendi, A.R.1
Chase, J.S.2
-
11
-
-
33750367175
-
Network monitors and contracting systems: competition and innovation
-
Sep
-
Laskowski P and Chuang J. Network monitors and contracting systems: competition and innovation. In Proc. SIGCOMM'06, 183-194, Sep 2006.
-
(2006)
Proc. SIGCOMM'06
, pp. 183-194
-
-
Laskowski, P.1
Chuang, J.2
-
13
-
-
84911902652
-
-
Emulab. Available: http://www.emulab.net/ 2011.
-
(2011)
-
-
-
15
-
-
58049120018
-
PeerReview: practical accountability for distributed systems
-
ACM New York, NY, USA
-
Haeberlen A, Kouznetsov P and Druschel P. PeerReview: practical accountability for distributed systems. Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, ACM New York, NY, USA, 2007; 175-188.
-
(2007)
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
, pp. 175-188
-
-
Haeberlen, A.1
Kouznetsov, P.2
Druschel, P.3
-
16
-
-
84911925810
-
-
Network Time Protocol
-
Network Time Protocol. Available at: http://en.wikipedia.org/wiki/Network_Time_Protocol 2011.
-
(2011)
-
-
-
17
-
-
57849159727
-
A distributed requirements management framework for legal compliance and accountability
-
Feb.-Mar.
-
Breauxa T, Antóna A and Spaffordb E. A distributed requirements management framework for legal compliance and accountability. Computers & Security Feb.-Mar. 2009; 28(1-2): 8-17.
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 8-17
-
-
Breauxa, T.1
Antóna, A.2
Spaffordb, E.3
-
19
-
-
79959969249
-
Tracking Adversarial Behavior in Distributed Systems with Secure Network Provenance
-
University of Pennsylvania Department of Computer and Information Science Technical Report
-
Zhou W, Haeberlen A, Loo B, Sherr M. Tracking Adversarial Behavior in Distributed Systems with Secure Network Provenance. University of Pennsylvania Department of Computer and Information Science Technical Report, 2010.
-
(2010)
-
-
Zhou, W.1
Haeberlen, A.2
Loo, B.3
Sherr, M.4
-
20
-
-
84868653401
-
Design and analysis of a dynamically configured log-based distributed security event detection methodology
-
Grimaila M, Myers J, Mills R and Peterson G. Design and analysis of a dynamically configured log-based distributed security event detection methodology. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 2011. DOI: 10.1177/1548512911399303.
-
(2011)
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology
-
-
Grimaila, M.1
Myers, J.2
Mills, R.3
Peterson, G.4
-
22
-
-
79954594099
-
Subjective audio quality over a secure IEEE 802.11n network
-
Ramsey BW, Mullins BE, Thomas RW, TR Andel. Subjective audio quality over a secure IEEE 802.11n network. International Journal of Security and Networks 2011; 6(1): 53-63.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 53-63
-
-
Ramsey, B.W.1
Mullins, B.E.2
Thomas, R.W.3
Andel, T.R.4
-
24
-
-
79954619874
-
Towards modelling the impact of cyber attacks on a smart grid
-
Kundur D, Feng X, Mashayekh S, Liu S, Zourntos T, KL Butler-Purry. Towards modelling the impact of cyber attacks on a smart grid. International Journal of Security and Networks 2011; 6(1): 2-13.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 2-13
-
-
Kundur, D.1
Feng, X.2
Mashayekh, S.3
Liu, S.4
Zourntos, T.5
Butler-Purry, K.L.6
-
25
-
-
79954597540
-
Privacy protection system and metrics for hiding electrical events
-
Kalogridis G, Denic SZ, Lewis T, Cepeda R. Privacy protection system and metrics for hiding electrical events. International Journal of Security and Networks 2011; 6(1): 14-27.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 14-27
-
-
Kalogridis, G.1
Denic, S.Z.2
Lewis, T.3
Cepeda, R.4
-
26
-
-
79954614519
-
Secure and privacy-preserving information aggregation for smart grids
-
Li F, Luo B, Liu P. Secure and privacy-preserving information aggregation for smart grids. International Journal of Security and Networks 2011; 6(1): 28-39.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 28-39
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
38
-
-
77949732329
-
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
-
Guo H, Mu Y, Zhang XY and Li ZJ. Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security. International Journal of Security and Networks 2010; 5(2/3): 173-187.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 173-187
-
-
Guo, H.1
Mu, Y.2
Zhang, X.Y.3
Li, Z.J.4
-
42
-
-
77949760270
-
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
-
Leng X, Lien Y, Mayes K and Markantonakis K. An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing. International Journal of Security and Networks 2010; 5(2/3); 79-86. Dalton GC II, Edge KS, Mills RF and Raines RA. Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees. International Journal of Security and Networks 2010; 5(2/3): 87-95.
-
(2010)
International Journal of Security and Networks 2010; 5(2/3); 79-86. and Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees. International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 87-95
-
-
Leng, X.1
Lien, Y.2
Mayes, K.3
Markantonakis, K.4
Dalton, G.C.5
Edge, K.S.6
Mills, R.F.7
Raines, R.A.8
-
46
-
-
77949694146
-
Security and privacy on low-cost Radio Frequency Identification systems
-
Sun L. Security and privacy on low-cost Radio Frequency Identification systems. International Journal of Security and Networks 2010; 5(2/3): 128-134.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 128-134
-
-
Sun, L.1
-
48
-
-
77949765113
-
Radio frequency identification: a case study of healthcare organisations
-
Azevedo SG and Ferreira JJ. Radio frequency identification: a case study of healthcare organisations. International Journal of Security and Networks 2010; 5(2/3): 147-155.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 147-155
-
-
Azevedo, S.G.1
Ferreira, J.J.2
-
49
-
-
77949750049
-
A ubiquitous mobile telemedicine system for the elderly using RFID
-
Raad M. A ubiquitous mobile telemedicine system for the elderly using RFID. International Journal of Security and Networks 2010; 5(2/3): 156-164.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 156-164
-
-
Raad, M.1
-
50
-
-
77949666177
-
Perceived barriers to the widespread commercial use of radio frequency identification technology
-
Rodrigues MJ and James K. Perceived barriers to the widespread commercial use of radio frequency identification technology. International Journal of Security and Networks 2010; 5(2/3): 165-172.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 165-172
-
-
Rodrigues, M.J.1
James, K.2
-
52
-
-
77949837905
-
A backpressure technique for filtering spoofed traffic at upstream routers
-
Malliga S and Tamilarasi A. A backpressure technique for filtering spoofed traffic at upstream routers. International Journal of Security and Networks 2010; 5(1): 3-14.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 3-14
-
-
Malliga, S.1
Tamilarasi, A.2
-
53
-
-
77949801623
-
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
-
Huang S and Shieh S. Authentication and secret search mechanisms for RFID-aware wireless sensor networks. International Journal of Security and Networks 2010; 5(1): 15-25.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 15-25
-
-
Huang, S.1
Shieh, S.2
-
54
-
-
77949844099
-
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
-
Hsiao Y and Hwang R. An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks. International Journal of Security and Networks 2010; 5(1): 26-34.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 26-34
-
-
Hsiao, Y.1
Hwang, R.2
-
56
-
-
77949817850
-
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
-
Tsai K, Hsu C and Wu T. Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks. International Journal of Security and Networks 2010; 5(1): 45-52.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 45-52
-
-
Tsai, K.1
Hsu, C.2
Wu, T.3
-
57
-
-
77949864345
-
Lightweight authentication protocol for mobile RFID networks
-
Yang M. Lightweight authentication protocol for mobile RFID networks. International Journal of Security and Networks 2010; 5(1): 53-62.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 53-62
-
-
Yang, M.1
-
58
-
-
77949830969
-
A cross-layer authentication design for secure video transportation in wireless sensor network
-
Wang J and Smith GL. A cross-layer authentication design for secure video transportation in wireless sensor network. International Journal of Security and Networks 2010; 5(1): 63-76.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 63-76
-
-
Wang, J.1
Smith, G.L.2
-
59
-
-
70349969846
-
A proactive secret sharing scheme in matrix projection method
-
Bai L and Zou X. A proactive secret sharing scheme in matrix projection method. International Journal of Security and Networks 2009; 4(4): 201-209.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 201-209
-
-
Bai, L.1
Zou, X.2
-
62
-
-
70349949111
-
Visibility: a novel concept for characterising provable network digital evidences
-
Rekhis S, Boudriga Noureddine A. Visibility: a novel concept for characterising provable network digital evidences. International Journal of Security and Networks 2009; 4(4): 234-245.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 234-245
-
-
Rekhis, S.1
Boudriga, N.A.2
-
66
-
-
68149158275
-
An efficient one-time password authentication scheme using a smart card
-
Lee S and Sivalingam KM. An efficient one-time password authentication scheme using a smart card. International Journal of Security and Networks 2009; 4(3): 145-152.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 145-152
-
-
Lee, S.1
Sivalingam, K.M.2
-
70
-
-
68149180871
-
Intrusion detection system for denial-of-service flooding attacks in SIP communication networks
-
Ehlert S, Rebahi Y and Magedanz T. Intrusion detection system for denial-of-service flooding attacks in SIP communication networks. International Journal of Security and Networks 2009; 4(3): 189-200.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 189-200
-
-
Ehlert, S.1
Rebahi, Y.2
Magedanz, T.3
-
71
-
-
61849085156
-
An evaluation of connection characteristics for separating network attacks
-
Berthier R and Cukier M. An evaluation of connection characteristics for separating network attacks. International Journal of Security and Networks 2009; 4(1/2): 110-124.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 110-124
-
-
Berthier, R.1
Cukier, M.2
-
72
-
-
61849158146
-
An efficient group key management scheme for mobile ad hoc networks
-
Wu B, Wu J and Dong Y. An efficient group key management scheme for mobile ad hoc networks. International Journal of Security and Networks 2009; 4(1/2): 125-134.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 125-134
-
-
Wu, B.1
Wu, J.2
Dong, Y.3
-
76
-
-
61849134762
-
Secure pairing with biometrics
-
Buhan I, Boom B, Doumen J, Hartel PH and Veldhuis RNJ. Secure pairing with biometrics. International Journal of Security and Networks 2009; 4(1/2): 27-42.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 27-42
-
-
Buhan, I.1
Boom, B.2
Doumen, J.3
Hartel, P.H.4
Veldhuis, R.N.J.5
-
78
-
-
61849184822
-
Using audio in secure device pairing
-
Goodrich MT, Sirivianos M, Solis J, Soriente C, Tsudik G and Uzun E. Using audio in secure device pairing. International Journal of Security and Networks 2009; 4(1/2): 57-68.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 57-68
-
-
Goodrich, M.T.1
Sirivianos, M.2
Solis, J.3
Soriente, C.4
Tsudik, G.5
Uzun, E.6
-
81
-
-
61849158147
-
Designing user studies for security applications: a case study with wireless network configuration
-
Kuo C, Perrig A and Walker J. Designing user studies for security applications: a case study with wireless network configuration. International Journal of Security and Networks 2009;. 409(1/2): 101-109.
-
(2009)
International Journal of Security and Networks
, vol.409
, Issue.1-2
, pp. 101-109
-
-
Kuo, C.1
Perrig, A.2
Walker, J.3
-
84
-
-
77953193668
-
NTPDownloadT: a conformance test tool for secured mobile download services
-
Hsieh C, Chen J, Lin Y-B, Chen K, Liao H and Liang C. NTPDownloadT: a conformance test tool for secured mobile download services. International Journal of Security and Networks 2008; 3(4): 240-249.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 240-249
-
-
Hsieh, C.1
Chen, J.2
Lin, Y.-B.3
Chen, K.4
Liao, H.5
Liang, C.6
-
86
-
-
79551651366
-
Secure hybrid routing with micro/macromobility handoff mechanisms for urban wireless mesh networks
-
Kandikattu R and Jacob L. Secure hybrid routing with micro/macromobility handoff mechanisms for urban wireless mesh networks. International Journal of Security and Networks 2008; 3(4): 258-274.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 258-274
-
-
Kandikattu, R.1
Jacob, L.2
-
89
-
-
77954327354
-
PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks
-
Li F, Srinivasan A and Wu J. PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks. International Journal of Security and Networks 2008; 3(3): 173-182.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 173-182
-
-
Li, F.1
Srinivasan, A.2
Wu, J.3
-
91
-
-
72549101766
-
An agent-based framework for intrusion detection alert verification and event correlation
-
Uphoff B and Wong JS. An agent-based framework for intrusion detection alert verification and event correlation. International Journal of Security and Networks 2008 3(3): 193-200.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 193-200
-
-
Uphoff, B.1
Wong, J.S.2
-
92
-
-
79951661564
-
Secure user-identification and key distribution scheme preserving anonymity
-
Tripathy S and Nandi S. Secure user-identification and key distribution scheme preserving anonymity. International Journal of Security and Networks 2008; 3(3): 201-205.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 201-205
-
-
Tripathy, S.1
Nandi, S.2
-
93
-
-
77952481544
-
ID-based threshold proxy signcryption scheme from bilinear pairings
-
Li F, Xin X and Hu Y. ID-based threshold proxy signcryption scheme from bilinear pairings. International Journal of Security and Networks 2008; 3(3): 206-215.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 206-215
-
-
Li, F.1
Xin, X.2
Hu, Y.3
-
94
-
-
51849141536
-
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
-
Lin X, Ling X, Zhu H, Ho P and Shen X. A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks. International Journal of Security and Networks 2008; 3(2): 122-132.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 122-132
-
-
Lin, X.1
Ling, X.2
Zhu, H.3
Ho, P.4
Shen, X.5
-
97
-
-
77955714466
-
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
-
Ray I and Poolsappasit N. Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. International Journal of Security and Networks 2008; 3(2): 80-94.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 80-94
-
-
Ray, I.1
Poolsappasit, N.2
-
98
-
-
70149104596
-
Forensic analysis of SCADA systems and networks
-
Kilpatrick T, Gonzalez J, Chandia R, Papa M and Shenoi S. Forensic analysis of SCADA systems and networks. International Journal of Security and Networks 2008; 3(2): 95-102.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 95-102
-
-
Kilpatrick, T.1
Gonzalez, J.2
Chandia, R.3
Papa, M.4
Shenoi, S.5
-
103
-
-
85086420396
-
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
-
Scheirer W and Chuah M. Syntax vs. semantics: competing approaches to dynamic network intrusion detection. International Journal of Security and Networks 2008; 3(1): 24-35.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 24-35
-
-
Scheirer, W.1
Chuah, M.2
-
104
-
-
79951598312
-
Origins: an approach to trace fast spreading worms to their roots
-
Burt AL, Darschewski M, Ray I, Thurimella R and Wu H. Origins: an approach to trace fast spreading worms to their roots. International Journal of Security and Networks 2008; 3(1): 36-46.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 36-46
-
-
Burt, A.L.1
Darschewski, M.2
Ray, I.3
Thurimella, R.4
Wu, H.5
-
105
-
-
79951619296
-
A novel conference key management solution for secure dynamic conferencing
-
Zou X and Karandikar Y. A novel conference key management solution for secure dynamic conferencing. International Journal of Security and Networks 2008; 3(1): 47-53.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 47-53
-
-
Zou, X.1
Karandikar, Y.2
-
107
-
-
79951662876
-
Towards a realistic testbed for wireless network reliability and security performance studies
-
Hu F, Rughoonundon A and Celentano L. Towards a realistic testbed for wireless network reliability and security performance studies. International Journal of Security and Networks 2008; 3(1): 63-77.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 63-77
-
-
Hu, F.1
Rughoonundon, A.2
Celentano, L.3
-
108
-
-
79951639076
-
Editorial
-
Mu Y, Chen L, Chen X, Gong G, Lee P, Miyaji A, Pieprzyk J, Pointcheval D, Takagi T, Traore J, Seberry J, Susilo W, Wang H and Zhang F. Editorial. International Journal of Security and Networks 2007; 2(3/4): 171-174.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 171-174
-
-
Mu, Y.1
Chen, L.2
Chen, X.3
Gong, G.4
Lee, P.5
Miyaji, A.6
Pieprzyk, J.7
Pointcheval, D.8
Takagi, T.9
Traore, J.10
Seberry, J.11
Susilo, W.12
Wang, H.13
Zhang, F.14
-
109
-
-
85016433011
-
Efficient multicast stream authentication for the fully adversarial network model
-
Tartary C and Wang H. Efficient multicast stream authentication for the fully adversarial network model. International Journal of Security and Networks 2007; 2(3/4): 175-191.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 175-191
-
-
Tartary, C.1
Wang, H.2
-
111
-
-
79951648076
-
LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
-
Hsu H, Zhu S and Hurson AR. LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. International Journal of Security and Networks 2007; 2(3/4): 202-215.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 202-215
-
-
Hsu, H.1
Zhu, S.2
Hurson, A.R.3
-
113
-
-
79951645452
-
Server side hashing core exceeding 3 Gbps of throughput
-
Michail HE, Panagiotakopoulos GA, Thanasoulis VN, Kakarountas AP and Goutis CE. Server side hashing core exceeding 3 Gbps of throughput. International Journal of Security and Networks 2007; 2(3/4): 228-238.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 228-238
-
-
Michail, H.E.1
Panagiotakopoulos, G.A.2
Thanasoulis, V.N.3
Kakarountas, A.P.4
Goutis, C.E.5
-
114
-
-
68149086398
-
Preventing or utilising key escrow in identity based schemes employed in mobile ad hoc networks
-
Hoeper K and Gong G. Preventing or utilising key escrow in identity based schemes employed in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4): 239-250.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 239-250
-
-
Hoeper, K.1
Gong, G.2
-
115
-
-
38049042723
-
On security proof of McCullagh-Barreto's key agreement protocol and its variants
-
Cheng Z and Chen L. On security proof of McCullagh-Barreto's key agreement protocol and its variants. International Journal of Security and Networks 2007; 2(3/4):251-259.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 251-259
-
-
Cheng, Z.1
Chen, L.2
-
117
-
-
66249092571
-
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
-
Huang D. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4): 272-283.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 272-283
-
-
Huang, D.1
-
118
-
-
79951638712
-
Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol
-
Abdalla M, Bresson E, Chevassut O, Moller B and Pointcheval D. Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol. International Journal of Security and Networks 2007; 2(3/4): 284-296.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 284-296
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Moller, B.4
Pointcheval, D.5
-
120
-
-
79551652560
-
DKMS: distributed hierarchical access control for multimedia networks
-
Li R, Li J and Chen H. DKMS: distributed hierarchical access control for multimedia networks. International Journal of Security and Networks 2007; 2(1/2): 3-10.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 3-10
-
-
Li, R.1
Li, J.2
Chen, H.3
-
122
-
-
74549116861
-
Securing Wi-Fi networks with position verification: extended version
-
Malaney RA. Securing Wi-Fi networks with position verification: extended version. International Journal of Security and Networks 2007; 2(1/2): 27-36.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 27-36
-
-
Malaney, R.A.1
-
124
-
-
74049111426
-
Hash-AV: fast virus signature scanning by cache-resident filters
-
Erdogan O and Cao P. Hash-AV: fast virus signature scanning by cache-resident filters. International Journal of Security and Networks 2007; 2(1/2): 50-59.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 50-59
-
-
Erdogan, O.1
Cao, P.2
-
125
-
-
79551643767
-
Secure message delivery in publish/subscribe networks using overlay multicast
-
Rabinovich P and Simon R. Secure message delivery in publish/subscribe networks using overlay multicast. International Journal of Security and Networks 2007; 2(1/2): 60-70.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 60-70
-
-
Rabinovich, P.1
Simon, R.2
-
126
-
-
34548366188
-
Optimal worm-scanning method using vulnerablehost distributions
-
Chen Z and Ji C. Optimal worm-scanning method using vulnerablehost distributions. International Journal of Security and Networks 2007; 2(1/2): 71-80.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 71-80
-
-
Chen, Z.1
Ji, C.2
-
129
-
-
79551646922
-
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
-
Ling H and Znati T. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. International Journal of Security and Networks 2007; 2(1/2): 109-121.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 109-121
-
-
Ling, H.1
Znati, T.2
-
130
-
-
39349109602
-
Design and analysis of a multipacket signature detection system
-
Artan NS and Chao HJ. Design and analysis of a multipacket signature detection system. International Journal of Security and Networks 2007; 2(1/2): 122-136.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 122-136
-
-
Artan, N.S.1
Chao, H.J.2
-
134
-
-
77955716028
-
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
-
Wang X. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. International Journal of Security and Networks 2006; 1(3/4): 184-197.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 184-197
-
-
Wang, X.1
-
138
-
-
79951716783
-
Low-power authenticated group key agreement for heterogeneous wireless networks
-
Teo J, Tan C and Ng J. Low-power authenticated group key agreement for heterogeneous wireless networks. International Journal of Security and Networks 2006; 1(3/4): 226-236.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 226-236
-
-
Teo, J.1
Tan, C.2
Ng, J.3
-
139
-
-
77954644745
-
A new signature scheme without random oracles
-
Tan C. A new signature scheme without random oracles. International Journal of Security and Networks 2006; 1(3/4): 237-242.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 237-242
-
-
Tan, C.1
-
140
-
-
67649498303
-
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
-
Liu Y, Comaniciu C and Man H. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. International Journal of Security and Networks 2006; 1(3/4): 243-254.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.3-4
, pp. 243-254
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
145
-
-
79951694028
-
Analysis of routing security-energy trade-offs in wireless sensor networks
-
Al-Karaki JN. Analysis of routing security-energy trade-offs in wireless sensor networks. International Journal of Security and Networks 2006-2006; 1(3/4): 147-157.
-
(2006)
International Journal of Security and Networks 2006
, vol.1
, Issue.3-4
, pp. 147-157
-
-
Al-Karaki, J.N.1
-
146
-
-
49949107235
-
Load-balanced key establishment methodologies in wireless sensor networks
-
Araz O and Qi H. Load-balanced key establishment methodologies in wireless sensor networks. International Journal of Security and Networks 2006-2006; 1(3/4): 158-166.
-
(2006)
International Journal of Security and Networks 2006
, vol.1
, Issue.3-4
, pp. 158-166
-
-
Araz, O.1
Qi, H.2
-
147
-
-
84890880165
-
Limiting DoS attacks during multihop data delivery in wireless sensor networks
-
Deng J, Han R and Mishra S. Limiting DoS attacks during multihop data delivery in wireless sensor networks. International Journal of Security and Networks 2006-2006; 1(3/4): 167-178.
-
(2006)
International Journal of Security and Networks 2006
, vol.1
, Issue.3-4
, pp. 167-178
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
151
-
-
54249117650
-
Secure scalable group signature with dynamic joins and separable authorities
-
Kiayias A and Yung M. Secure scalable group signature with dynamic joins and separable authorities. International Journal of Security and Networks 2006; 1(1/2): 24-45.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 24-45
-
-
Kiayias, A.1
Yung, M.2
-
155
-
-
74549166520
-
Wireless networking security: open issues in trust, management, interoperation and measurement
-
Evans JB, Wang W and Ewy BJ. Wireless networking security: open issues in trust, management, interoperation and measurement. International Journal of Security and Networks 2006; 1(1/2): 84-94.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 84-94
-
-
Evans, J.B.1
Wang, W.2
Ewy, B.J.3
-
156
-
-
72449209394
-
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
-
Englund H and Johansson T. Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. International Journal of Security and Networks 2006; 1(1/2): 95-102.
-
(2006)
International Journal of Security and Networks
, vol.1
, Issue.1-2
, pp. 95-102
-
-
Englund, H.1
Johansson, T.2
-
159
-
-
77949974817
-
PLUS: parameterised localised trust management-based security framework for sensor networks
-
Yao Z, Kim D and Doh Y. PLUS: parameterised localised trust management-based security framework for sensor networks, International Journal of Sensor Networks 2008; 3(4): 224-236.
-
(2008)
International Journal of Sensor Networks
, vol.3
, Issue.4
, pp. 224-236
-
-
Yao, Z.1
Kim, D.2
Doh, Y.3
-
162
-
-
79959730306
-
Scatter-secure code authentication for efficient reprogramming in wireless sensor networks
-
Krontiris I and Dimitriou T. Scatter-secure code authentication for efficient reprogramming in wireless sensor networks. Journal of Sensor Networks 2011; 10(1/2): 14-24.
-
(2011)
Journal of Sensor Networks
, vol.10
, Issue.1-2
, pp. 14-24
-
-
Krontiris, I.1
Dimitriou, T.2
-
163
-
-
67650737028
-
Efficient and secure password authentication schemes for low-power devices
-
Kim K, Jeon J and Yoo K. Efficient and secure password authentication schemes for low-power devices. International Journal of Sensor Networks 2006; 2(1/2): 77-81.
-
(2006)
International Journal of Sensor Networks
, vol.2
, Issue.1-2
, pp. 77-81
-
-
Kim, K.1
Jeon, J.2
Yoo, K.3
-
164
-
-
77949934394
-
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
-
Janies J, Huang C, Johnson NL, Richardson T. SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks. International Journal of Sensor Networks 2007; 2(5/6): 358-367.
-
(2007)
International Journal of Sensor Networks
, vol.2
, Issue.5-6
, pp. 358-367
-
-
Janies, J.1
Huang, C.2
Johnson, N.L.3
Richardson, T.4
-
165
-
-
77949957419
-
Multiple-input turbo code for secure data aggregation and source-channel coding in wireless sensor networks
-
Cam H. Multiple-input turbo code for secure data aggregation and source-channel coding in wireless sensor networks. International Journal of Sensor Networks 2007; 2(5/6): 375-385.
-
(2007)
International Journal of Sensor Networks
, vol.2
, Issue.5-6
, pp. 375-385
-
-
Cam, H.1
-
166
-
-
79960484364
-
An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks
-
Yu C-M, Li C-C, Lu C-S, Kuo S-Y. An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks. International Journal of Sensor Networks 2011; 9(2): 89-106.
-
(2011)
International Journal of Sensor Networks
, vol.9
, Issue.2
, pp. 89-106
-
-
Yu, C.-M.1
Li, C.-C.2
Lu, C.-S.3
Kuo, S.-Y.4
-
167
-
-
79959704098
-
PERSEN: power-efficient logical ring based key management for clustered sensor networks
-
Poornima AS and Amberker BB. PERSEN: power-efficient logical ring based key management for clustered sensor networks. Journal of Sensor Networks 2011; 10(1/2): 94-103.
-
(2011)
Journal of Sensor Networks
, vol.10
, Issue.1-2
, pp. 94-103
-
-
Poornima, A.S.1
Amberker, B.B.2
-
168
-
-
76649121954
-
Performance implications of periodic key exchanges and packet integrity overhead in an 802.15.4 beacon enabled cluster
-
Misic J, Amini F and Khan M. Performance implications of periodic key exchanges and packet integrity overhead in an 802.15.4 beacon enabled cluster. International Journal of Sensor Networks 2008; 2(1): 33-42.
-
(2008)
International Journal of Sensor Networks
, vol.2
, Issue.1
, pp. 33-42
-
-
Misic, J.1
Amini, F.2
Khan, M.3
-
170
-
-
79960540104
-
Key establishment protocols using environmental and physiological data in wireless sensor networks
-
Singh K and Muthukkumarasamy V. Key establishment protocols using environmental and physiological data in wireless sensor networks. International Journal of Sensor Networks 2010; 8(1): 8-26.
-
(2010)
International Journal of Sensor Networks
, vol.8
, Issue.1
, pp. 8-26
-
-
Singh, K.1
Muthukkumarasamy, V.2
-
171
-
-
79960610662
-
Per node deployment based detection of controlled link establishment attack in distributed sensor networks
-
Tran TD, Agbinya JI and Al-Jumaily AA. Per node deployment based detection of controlled link establishment attack in distributed sensor networks. International Journal of Sensor Networks 2011; 9(3/4).
-
(2011)
International Journal of Sensor Networks
, vol.9
, Issue.3-4
-
-
Tran, T.D.1
Agbinya, J.I.2
Al-Jumaily, A.A.3
|