메뉴 건너뛰기




Volumn 7, Issue 12, 2014, Pages 2564-2586

GlobalView: Building global view with log files in a distributed/networked system for accountability

Author keywords

Accountability; Distributed system; Emulab; Flow net; Global view; Logging; Network

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; DISTRIBUTED DATABASE SYSTEMS; LOGGING (FORESTRY); NETWORKS (CIRCUITS);

EID: 84911896278     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.374     Document Type: Article
Times cited : (14)

References (171)
  • 1
    • 70350060199 scopus 로고    scopus 로고
    • Flow-net methodology for accountability in wireless networks
    • Sept./Oct.
    • Xiao Y. Flow-net methodology for accountability in wireless networks. IEEE Network Sept./Oct. 2009; 23(5): 30-37.
    • (2009) IEEE Network , vol.23 , Issue.5 , pp. 30-37
    • Xiao, Y.1
  • 3
    • 33746368048 scopus 로고    scopus 로고
    • Enhancing security using mobility-based anomaly detection in cellular mobile networks
    • July
    • Sun B, Yu F, Wu K, Xiao Y, Leung VCM. Enhancing security using mobility-based anomaly detection in cellular mobile networks. IEEE Transactions on Vehicular Technology July 2006; 55(4): 1385-1396.
    • (2006) IEEE Transactions on Vehicular Technology , vol.55 , Issue.4 , pp. 1385-1396
    • Sun, B.1    Yu, F.2    Wu, K.3    Xiao, Y.4    Leung, V.C.M.5
  • 4
    • 36749008467 scopus 로고    scopus 로고
    • Detection of fraudulent usage in wireless networks
    • Nov.
    • Sun B, Xiao Y and Wang R. Detection of fraudulent usage in wireless networks. IEEE Transactions on Vehicular Technology Nov. 2007; 56(6): 3912-3923.
    • (2007) IEEE Transactions on Vehicular Technology , vol.56 , Issue.6 , pp. 3912-3923
    • Sun, B.1    Xiao, Y.2    Wang, R.3
  • 8
    • 41149122088 scopus 로고    scopus 로고
    • The role of accountability in dependable distributed systems
    • Jun
    • Yumerefendi AR and Chase JS. The role of accountability in dependable distributed systems. In Proceedings of HotDep, Jun 2005.
    • (2005) roceedings of HotDep
    • Yumerefendi, A.R.1    Chase, J.S.2
  • 11
    • 33750367175 scopus 로고    scopus 로고
    • Network monitors and contracting systems: competition and innovation
    • Sep
    • Laskowski P and Chuang J. Network monitors and contracting systems: competition and innovation. In Proc. SIGCOMM'06, 183-194, Sep 2006.
    • (2006) Proc. SIGCOMM'06 , pp. 183-194
    • Laskowski, P.1    Chuang, J.2
  • 13
    • 84911902652 scopus 로고    scopus 로고
    • Emulab. Available: http://www.emulab.net/ 2011.
    • (2011)
  • 16
    • 84911925810 scopus 로고    scopus 로고
    • Network Time Protocol
    • Network Time Protocol. Available at: http://en.wikipedia.org/wiki/Network_Time_Protocol 2011.
    • (2011)
  • 17
    • 57849159727 scopus 로고    scopus 로고
    • A distributed requirements management framework for legal compliance and accountability
    • Feb.-Mar.
    • Breauxa T, Antóna A and Spaffordb E. A distributed requirements management framework for legal compliance and accountability. Computers & Security Feb.-Mar. 2009; 28(1-2): 8-17.
    • (2009) Computers & Security , vol.28 , Issue.1-2 , pp. 8-17
    • Breauxa, T.1    Antóna, A.2    Spaffordb, E.3
  • 19
    • 79959969249 scopus 로고    scopus 로고
    • Tracking Adversarial Behavior in Distributed Systems with Secure Network Provenance
    • University of Pennsylvania Department of Computer and Information Science Technical Report
    • Zhou W, Haeberlen A, Loo B, Sherr M. Tracking Adversarial Behavior in Distributed Systems with Secure Network Provenance. University of Pennsylvania Department of Computer and Information Science Technical Report, 2010.
    • (2010)
    • Zhou, W.1    Haeberlen, A.2    Loo, B.3    Sherr, M.4
  • 26
    • 79954614519 scopus 로고    scopus 로고
    • Secure and privacy-preserving information aggregation for smart grids
    • Li F, Luo B, Liu P. Secure and privacy-preserving information aggregation for smart grids. International Journal of Security and Networks 2011; 6(1): 28-39.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.1 , pp. 28-39
    • Li, F.1    Luo, B.2    Liu, P.3
  • 38
    • 77949732329 scopus 로고    scopus 로고
    • Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
    • Guo H, Mu Y, Zhang XY and Li ZJ. Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security. International Journal of Security and Networks 2010; 5(2/3): 173-187.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 173-187
    • Guo, H.1    Mu, Y.2    Zhang, X.Y.3    Li, Z.J.4
  • 40
  • 46
    • 77949694146 scopus 로고    scopus 로고
    • Security and privacy on low-cost Radio Frequency Identification systems
    • Sun L. Security and privacy on low-cost Radio Frequency Identification systems. International Journal of Security and Networks 2010; 5(2/3): 128-134.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 128-134
    • Sun, L.1
  • 48
    • 77949765113 scopus 로고    scopus 로고
    • Radio frequency identification: a case study of healthcare organisations
    • Azevedo SG and Ferreira JJ. Radio frequency identification: a case study of healthcare organisations. International Journal of Security and Networks 2010; 5(2/3): 147-155.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 147-155
    • Azevedo, S.G.1    Ferreira, J.J.2
  • 49
    • 77949750049 scopus 로고    scopus 로고
    • A ubiquitous mobile telemedicine system for the elderly using RFID
    • Raad M. A ubiquitous mobile telemedicine system for the elderly using RFID. International Journal of Security and Networks 2010; 5(2/3): 156-164.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 156-164
    • Raad, M.1
  • 50
    • 77949666177 scopus 로고    scopus 로고
    • Perceived barriers to the widespread commercial use of radio frequency identification technology
    • Rodrigues MJ and James K. Perceived barriers to the widespread commercial use of radio frequency identification technology. International Journal of Security and Networks 2010; 5(2/3): 165-172.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 165-172
    • Rodrigues, M.J.1    James, K.2
  • 52
    • 77949837905 scopus 로고    scopus 로고
    • A backpressure technique for filtering spoofed traffic at upstream routers
    • Malliga S and Tamilarasi A. A backpressure technique for filtering spoofed traffic at upstream routers. International Journal of Security and Networks 2010; 5(1): 3-14.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 3-14
    • Malliga, S.1    Tamilarasi, A.2
  • 53
    • 77949801623 scopus 로고    scopus 로고
    • Authentication and secret search mechanisms for RFID-aware wireless sensor networks
    • Huang S and Shieh S. Authentication and secret search mechanisms for RFID-aware wireless sensor networks. International Journal of Security and Networks 2010; 5(1): 15-25.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 15-25
    • Huang, S.1    Shieh, S.2
  • 54
    • 77949844099 scopus 로고    scopus 로고
    • An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
    • Hsiao Y and Hwang R. An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks. International Journal of Security and Networks 2010; 5(1): 26-34.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 26-34
    • Hsiao, Y.1    Hwang, R.2
  • 55
    • 77949835881 scopus 로고    scopus 로고
    • Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
    • Xu L, Chen S, Huang X and Mu Y. Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks. International Journal of Security and Networks 2010; 5(1): 35-44.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 35-44
    • Xu, L.1    Chen, S.2    Huang, X.3    Mu, Y.4
  • 56
    • 77949817850 scopus 로고    scopus 로고
    • Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
    • Tsai K, Hsu C and Wu T. Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks. International Journal of Security and Networks 2010; 5(1): 45-52.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 45-52
    • Tsai, K.1    Hsu, C.2    Wu, T.3
  • 57
    • 77949864345 scopus 로고    scopus 로고
    • Lightweight authentication protocol for mobile RFID networks
    • Yang M. Lightweight authentication protocol for mobile RFID networks. International Journal of Security and Networks 2010; 5(1): 53-62.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 53-62
    • Yang, M.1
  • 58
    • 77949830969 scopus 로고    scopus 로고
    • A cross-layer authentication design for secure video transportation in wireless sensor network
    • Wang J and Smith GL. A cross-layer authentication design for secure video transportation in wireless sensor network. International Journal of Security and Networks 2010; 5(1): 63-76.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 63-76
    • Wang, J.1    Smith, G.L.2
  • 59
    • 70349969846 scopus 로고    scopus 로고
    • A proactive secret sharing scheme in matrix projection method
    • Bai L and Zou X. A proactive secret sharing scheme in matrix projection method. International Journal of Security and Networks 2009; 4(4): 201-209.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 201-209
    • Bai, L.1    Zou, X.2
  • 61
    • 70349968221 scopus 로고    scopus 로고
    • Handling inheritance violation for secure interoperation of heterogeneous systems
    • Huang H, Kirchner H, Liu S and Wu W. Handling inheritance violation for secure interoperation of heterogeneous systems. International Journal of Security and Networks 2009; 4(4): 223-233.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 223-233
    • Huang, H.1    Kirchner, H.2    Liu, S.3    Wu, W.4
  • 62
    • 70349949111 scopus 로고    scopus 로고
    • Visibility: a novel concept for characterising provable network digital evidences
    • Rekhis S, Boudriga Noureddine A. Visibility: a novel concept for characterising provable network digital evidences. International Journal of Security and Networks 2009; 4(4): 234-245.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 234-245
    • Rekhis, S.1    Boudriga, N.A.2
  • 64
    • 70349968010 scopus 로고    scopus 로고
    • Attacks and countermeasures in multihop Cognitive Radio Networks
    • Hu F, Dong D and Xiao Y, Attacks and countermeasures in multihop Cognitive Radio Networks. International Journal of Security and Networks 2009; 4(4): 263-271.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 263-271
    • Hu, F.1    Dong, D.2    Xiao, Y.3
  • 65
  • 66
    • 68149158275 scopus 로고    scopus 로고
    • An efficient one-time password authentication scheme using a smart card
    • Lee S and Sivalingam KM. An efficient one-time password authentication scheme using a smart card. International Journal of Security and Networks 2009; 4(3): 145-152.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 145-152
    • Lee, S.1    Sivalingam, K.M.2
  • 70
    • 68149180871 scopus 로고    scopus 로고
    • Intrusion detection system for denial-of-service flooding attacks in SIP communication networks
    • Ehlert S, Rebahi Y and Magedanz T. Intrusion detection system for denial-of-service flooding attacks in SIP communication networks. International Journal of Security and Networks 2009; 4(3): 189-200.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 189-200
    • Ehlert, S.1    Rebahi, Y.2    Magedanz, T.3
  • 71
    • 61849085156 scopus 로고    scopus 로고
    • An evaluation of connection characteristics for separating network attacks
    • Berthier R and Cukier M. An evaluation of connection characteristics for separating network attacks. International Journal of Security and Networks 2009; 4(1/2): 110-124.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 110-124
    • Berthier, R.1    Cukier, M.2
  • 72
    • 61849158146 scopus 로고    scopus 로고
    • An efficient group key management scheme for mobile ad hoc networks
    • Wu B, Wu J and Dong Y. An efficient group key management scheme for mobile ad hoc networks. International Journal of Security and Networks 2009; 4(1/2): 125-134.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 125-134
    • Wu, B.1    Wu, J.2    Dong, Y.3
  • 81
    • 61849158147 scopus 로고    scopus 로고
    • Designing user studies for security applications: a case study with wireless network configuration
    • Kuo C, Perrig A and Walker J. Designing user studies for security applications: a case study with wireless network configuration. International Journal of Security and Networks 2009;. 409(1/2): 101-109.
    • (2009) International Journal of Security and Networks , vol.409 , Issue.1-2 , pp. 101-109
    • Kuo, C.1    Perrig, A.2    Walker, J.3
  • 82
    • 79551645150 scopus 로고    scopus 로고
    • An one-way function based framework for pairwise key establishment in sensor networks
    • Ma L, Teymorian AY, Xing K and Du D. An one-way function based framework for pairwise key establishment in sensor networks. International Journal of Security and Networks 2008; 3(4): 217-225.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.4 , pp. 217-225
    • Ma, L.1    Teymorian, A.Y.2    Xing, K.3    Du, D.4
  • 86
    • 79551651366 scopus 로고    scopus 로고
    • Secure hybrid routing with micro/macromobility handoff mechanisms for urban wireless mesh networks
    • Kandikattu R and Jacob L. Secure hybrid routing with micro/macromobility handoff mechanisms for urban wireless mesh networks. International Journal of Security and Networks 2008; 3(4): 258-274.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.4 , pp. 258-274
    • Kandikattu, R.1    Jacob, L.2
  • 89
    • 77954327354 scopus 로고    scopus 로고
    • PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks
    • Li F, Srinivasan A and Wu J. PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks. International Journal of Security and Networks 2008; 3(3): 173-182.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 173-182
    • Li, F.1    Srinivasan, A.2    Wu, J.3
  • 91
    • 72549101766 scopus 로고    scopus 로고
    • An agent-based framework for intrusion detection alert verification and event correlation
    • Uphoff B and Wong JS. An agent-based framework for intrusion detection alert verification and event correlation. International Journal of Security and Networks 2008 3(3): 193-200.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 193-200
    • Uphoff, B.1    Wong, J.S.2
  • 92
    • 79951661564 scopus 로고    scopus 로고
    • Secure user-identification and key distribution scheme preserving anonymity
    • Tripathy S and Nandi S. Secure user-identification and key distribution scheme preserving anonymity. International Journal of Security and Networks 2008; 3(3): 201-205.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 201-205
    • Tripathy, S.1    Nandi, S.2
  • 93
    • 77952481544 scopus 로고    scopus 로고
    • ID-based threshold proxy signcryption scheme from bilinear pairings
    • Li F, Xin X and Hu Y. ID-based threshold proxy signcryption scheme from bilinear pairings. International Journal of Security and Networks 2008; 3(3): 206-215.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 206-215
    • Li, F.1    Xin, X.2    Hu, Y.3
  • 94
    • 51849141536 scopus 로고    scopus 로고
    • A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
    • Lin X, Ling X, Zhu H, Ho P and Shen X. A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks. International Journal of Security and Networks 2008; 3(2): 122-132.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 122-132
    • Lin, X.1    Ling, X.2    Zhu, H.3    Ho, P.4    Shen, X.5
  • 97
    • 77955714466 scopus 로고    scopus 로고
    • Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
    • Ray I and Poolsappasit N. Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. International Journal of Security and Networks 2008; 3(2): 80-94.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 80-94
    • Ray, I.1    Poolsappasit, N.2
  • 103
    • 85086420396 scopus 로고    scopus 로고
    • Syntax vs. semantics: competing approaches to dynamic network intrusion detection
    • Scheirer W and Chuah M. Syntax vs. semantics: competing approaches to dynamic network intrusion detection. International Journal of Security and Networks 2008; 3(1): 24-35.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 24-35
    • Scheirer, W.1    Chuah, M.2
  • 105
    • 79951619296 scopus 로고    scopus 로고
    • A novel conference key management solution for secure dynamic conferencing
    • Zou X and Karandikar Y. A novel conference key management solution for secure dynamic conferencing. International Journal of Security and Networks 2008; 3(1): 47-53.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 47-53
    • Zou, X.1    Karandikar, Y.2
  • 107
    • 79951662876 scopus 로고    scopus 로고
    • Towards a realistic testbed for wireless network reliability and security performance studies
    • Hu F, Rughoonundon A and Celentano L. Towards a realistic testbed for wireless network reliability and security performance studies. International Journal of Security and Networks 2008; 3(1): 63-77.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 63-77
    • Hu, F.1    Rughoonundon, A.2    Celentano, L.3
  • 109
    • 85016433011 scopus 로고    scopus 로고
    • Efficient multicast stream authentication for the fully adversarial network model
    • Tartary C and Wang H. Efficient multicast stream authentication for the fully adversarial network model. International Journal of Security and Networks 2007; 2(3/4): 175-191.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 175-191
    • Tartary, C.1    Wang, H.2
  • 111
    • 79951648076 scopus 로고    scopus 로고
    • LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
    • Hsu H, Zhu S and Hurson AR. LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. International Journal of Security and Networks 2007; 2(3/4): 202-215.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 202-215
    • Hsu, H.1    Zhu, S.2    Hurson, A.R.3
  • 114
    • 68149086398 scopus 로고    scopus 로고
    • Preventing or utilising key escrow in identity based schemes employed in mobile ad hoc networks
    • Hoeper K and Gong G. Preventing or utilising key escrow in identity based schemes employed in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4): 239-250.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 239-250
    • Hoeper, K.1    Gong, G.2
  • 115
    • 38049042723 scopus 로고    scopus 로고
    • On security proof of McCullagh-Barreto's key agreement protocol and its variants
    • Cheng Z and Chen L. On security proof of McCullagh-Barreto's key agreement protocol and its variants. International Journal of Security and Networks 2007; 2(3/4):251-259.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 251-259
    • Cheng, Z.1    Chen, L.2
  • 117
    • 66249092571 scopus 로고    scopus 로고
    • Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
    • Huang D. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. International Journal of Security and Networks 2007; 2(3/4): 272-283.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 272-283
    • Huang, D.1
  • 120
    • 79551652560 scopus 로고    scopus 로고
    • DKMS: distributed hierarchical access control for multimedia networks
    • Li R, Li J and Chen H. DKMS: distributed hierarchical access control for multimedia networks. International Journal of Security and Networks 2007; 2(1/2): 3-10.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 3-10
    • Li, R.1    Li, J.2    Chen, H.3
  • 122
    • 74549116861 scopus 로고    scopus 로고
    • Securing Wi-Fi networks with position verification: extended version
    • Malaney RA. Securing Wi-Fi networks with position verification: extended version. International Journal of Security and Networks 2007; 2(1/2): 27-36.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 27-36
    • Malaney, R.A.1
  • 124
    • 74049111426 scopus 로고    scopus 로고
    • Hash-AV: fast virus signature scanning by cache-resident filters
    • Erdogan O and Cao P. Hash-AV: fast virus signature scanning by cache-resident filters. International Journal of Security and Networks 2007; 2(1/2): 50-59.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 50-59
    • Erdogan, O.1    Cao, P.2
  • 125
    • 79551643767 scopus 로고    scopus 로고
    • Secure message delivery in publish/subscribe networks using overlay multicast
    • Rabinovich P and Simon R. Secure message delivery in publish/subscribe networks using overlay multicast. International Journal of Security and Networks 2007; 2(1/2): 60-70.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 60-70
    • Rabinovich, P.1    Simon, R.2
  • 126
    • 34548366188 scopus 로고    scopus 로고
    • Optimal worm-scanning method using vulnerablehost distributions
    • Chen Z and Ji C. Optimal worm-scanning method using vulnerablehost distributions. International Journal of Security and Networks 2007; 2(1/2): 71-80.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 71-80
    • Chen, Z.1    Ji, C.2
  • 129
    • 79551646922 scopus 로고    scopus 로고
    • End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
    • Ling H and Znati T. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. International Journal of Security and Networks 2007; 2(1/2): 109-121.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 109-121
    • Ling, H.1    Znati, T.2
  • 130
    • 39349109602 scopus 로고    scopus 로고
    • Design and analysis of a multipacket signature detection system
    • Artan NS and Chao HJ. Design and analysis of a multipacket signature detection system. International Journal of Security and Networks 2007; 2(1/2): 122-136.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 122-136
    • Artan, N.S.1    Chao, H.J.2
  • 134
    • 77955716028 scopus 로고    scopus 로고
    • The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
    • Wang X. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. International Journal of Security and Networks 2006; 1(3/4): 184-197.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 184-197
    • Wang, X.1
  • 137
  • 138
    • 79951716783 scopus 로고    scopus 로고
    • Low-power authenticated group key agreement for heterogeneous wireless networks
    • Teo J, Tan C and Ng J. Low-power authenticated group key agreement for heterogeneous wireless networks. International Journal of Security and Networks 2006; 1(3/4): 226-236.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 226-236
    • Teo, J.1    Tan, C.2    Ng, J.3
  • 139
    • 77954644745 scopus 로고    scopus 로고
    • A new signature scheme without random oracles
    • Tan C. A new signature scheme without random oracles. International Journal of Security and Networks 2006; 1(3/4): 237-242.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 237-242
    • Tan, C.1
  • 140
    • 67649498303 scopus 로고    scopus 로고
    • Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
    • Liu Y, Comaniciu C and Man H. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. International Journal of Security and Networks 2006; 1(3/4): 243-254.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 243-254
    • Liu, Y.1    Comaniciu, C.2    Man, H.3
  • 141
  • 145
    • 79951694028 scopus 로고    scopus 로고
    • Analysis of routing security-energy trade-offs in wireless sensor networks
    • Al-Karaki JN. Analysis of routing security-energy trade-offs in wireless sensor networks. International Journal of Security and Networks 2006-2006; 1(3/4): 147-157.
    • (2006) International Journal of Security and Networks 2006 , vol.1 , Issue.3-4 , pp. 147-157
    • Al-Karaki, J.N.1
  • 146
    • 49949107235 scopus 로고    scopus 로고
    • Load-balanced key establishment methodologies in wireless sensor networks
    • Araz O and Qi H. Load-balanced key establishment methodologies in wireless sensor networks. International Journal of Security and Networks 2006-2006; 1(3/4): 158-166.
    • (2006) International Journal of Security and Networks 2006 , vol.1 , Issue.3-4 , pp. 158-166
    • Araz, O.1    Qi, H.2
  • 147
    • 84890880165 scopus 로고    scopus 로고
    • Limiting DoS attacks during multihop data delivery in wireless sensor networks
    • Deng J, Han R and Mishra S. Limiting DoS attacks during multihop data delivery in wireless sensor networks. International Journal of Security and Networks 2006-2006; 1(3/4): 167-178.
    • (2006) International Journal of Security and Networks 2006 , vol.1 , Issue.3-4 , pp. 167-178
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 151
    • 54249117650 scopus 로고    scopus 로고
    • Secure scalable group signature with dynamic joins and separable authorities
    • Kiayias A and Yung M. Secure scalable group signature with dynamic joins and separable authorities. International Journal of Security and Networks 2006; 1(1/2): 24-45.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 24-45
    • Kiayias, A.1    Yung, M.2
  • 155
    • 74549166520 scopus 로고    scopus 로고
    • Wireless networking security: open issues in trust, management, interoperation and measurement
    • Evans JB, Wang W and Ewy BJ. Wireless networking security: open issues in trust, management, interoperation and measurement. International Journal of Security and Networks 2006; 1(1/2): 84-94.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 84-94
    • Evans, J.B.1    Wang, W.2    Ewy, B.J.3
  • 156
    • 72449209394 scopus 로고    scopus 로고
    • Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
    • Englund H and Johansson T. Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. International Journal of Security and Networks 2006; 1(1/2): 95-102.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.1-2 , pp. 95-102
    • Englund, H.1    Johansson, T.2
  • 159
    • 77949974817 scopus 로고    scopus 로고
    • PLUS: parameterised localised trust management-based security framework for sensor networks
    • Yao Z, Kim D and Doh Y. PLUS: parameterised localised trust management-based security framework for sensor networks, International Journal of Sensor Networks 2008; 3(4): 224-236.
    • (2008) International Journal of Sensor Networks , vol.3 , Issue.4 , pp. 224-236
    • Yao, Z.1    Kim, D.2    Doh, Y.3
  • 160
    • 77949927629 scopus 로고    scopus 로고
    • Secure target localisation in sensor networks using relaxation labelling
    • Chang CG, Snyder WE and Wang C. Secure target localisation in sensor networks using relaxation labelling. International Journal of Sensor Networks 2008; 4(3): 172-184.
    • (2008) International Journal of Sensor Networks , vol.4 , Issue.3 , pp. 172-184
    • Chang, C.G.1    Snyder, W.E.2    Wang, C.3
  • 161
    • 79960541794 scopus 로고    scopus 로고
    • Securing wireless sensor networks: an identity-based cryptography approach
    • Szczechowiak P, Scott M and Collier M. Securing wireless sensor networks: an identity-based cryptography approach. International Journal of Sensor Networks 2010; 8(3/4): 182-192.
    • (2010) International Journal of Sensor Networks , vol.8 , Issue.3-4 , pp. 182-192
    • Szczechowiak, P.1    Scott, M.2    Collier, M.3
  • 162
    • 79959730306 scopus 로고    scopus 로고
    • Scatter-secure code authentication for efficient reprogramming in wireless sensor networks
    • Krontiris I and Dimitriou T. Scatter-secure code authentication for efficient reprogramming in wireless sensor networks. Journal of Sensor Networks 2011; 10(1/2): 14-24.
    • (2011) Journal of Sensor Networks , vol.10 , Issue.1-2 , pp. 14-24
    • Krontiris, I.1    Dimitriou, T.2
  • 163
    • 67650737028 scopus 로고    scopus 로고
    • Efficient and secure password authentication schemes for low-power devices
    • Kim K, Jeon J and Yoo K. Efficient and secure password authentication schemes for low-power devices. International Journal of Sensor Networks 2006; 2(1/2): 77-81.
    • (2006) International Journal of Sensor Networks , vol.2 , Issue.1-2 , pp. 77-81
    • Kim, K.1    Jeon, J.2    Yoo, K.3
  • 165
    • 77949957419 scopus 로고    scopus 로고
    • Multiple-input turbo code for secure data aggregation and source-channel coding in wireless sensor networks
    • Cam H. Multiple-input turbo code for secure data aggregation and source-channel coding in wireless sensor networks. International Journal of Sensor Networks 2007; 2(5/6): 375-385.
    • (2007) International Journal of Sensor Networks , vol.2 , Issue.5-6 , pp. 375-385
    • Cam, H.1
  • 166
    • 79960484364 scopus 로고    scopus 로고
    • An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks
    • Yu C-M, Li C-C, Lu C-S, Kuo S-Y. An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks. International Journal of Sensor Networks 2011; 9(2): 89-106.
    • (2011) International Journal of Sensor Networks , vol.9 , Issue.2 , pp. 89-106
    • Yu, C.-M.1    Li, C.-C.2    Lu, C.-S.3    Kuo, S.-Y.4
  • 167
    • 79959704098 scopus 로고    scopus 로고
    • PERSEN: power-efficient logical ring based key management for clustered sensor networks
    • Poornima AS and Amberker BB. PERSEN: power-efficient logical ring based key management for clustered sensor networks. Journal of Sensor Networks 2011; 10(1/2): 94-103.
    • (2011) Journal of Sensor Networks , vol.10 , Issue.1-2 , pp. 94-103
    • Poornima, A.S.1    Amberker, B.B.2
  • 168
    • 76649121954 scopus 로고    scopus 로고
    • Performance implications of periodic key exchanges and packet integrity overhead in an 802.15.4 beacon enabled cluster
    • Misic J, Amini F and Khan M. Performance implications of periodic key exchanges and packet integrity overhead in an 802.15.4 beacon enabled cluster. International Journal of Sensor Networks 2008; 2(1): 33-42.
    • (2008) International Journal of Sensor Networks , vol.2 , Issue.1 , pp. 33-42
    • Misic, J.1    Amini, F.2    Khan, M.3
  • 170
    • 79960540104 scopus 로고    scopus 로고
    • Key establishment protocols using environmental and physiological data in wireless sensor networks
    • Singh K and Muthukkumarasamy V. Key establishment protocols using environmental and physiological data in wireless sensor networks. International Journal of Sensor Networks 2010; 8(1): 8-26.
    • (2010) International Journal of Sensor Networks , vol.8 , Issue.1 , pp. 8-26
    • Singh, K.1    Muthukkumarasamy, V.2
  • 171
    • 79960610662 scopus 로고    scopus 로고
    • Per node deployment based detection of controlled link establishment attack in distributed sensor networks
    • Tran TD, Agbinya JI and Al-Jumaily AA. Per node deployment based detection of controlled link establishment attack in distributed sensor networks. International Journal of Sensor Networks 2011; 9(3/4).
    • (2011) International Journal of Sensor Networks , vol.9 , Issue.3-4
    • Tran, T.D.1    Agbinya, J.I.2    Al-Jumaily, A.A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.