default search action
International Journal of Security and Networks (IJSN), Volume 4
Volume 4, Number 1/2, 2009
- Adin Scannell, Alex Varshavsky, Anthony LaMarca, Eyal de Lara:
Proximity-based authentication of mobile devices. 4-16 - Claudio Soriente, Gene Tsudik, Ersin Uzun:
Secure pairing of interface constrained devices. 17-26 - Ileana Buhan, Bas Boom, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis:
Secure pairing with biometrics. 27-42 - Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Seeing-Is-Believing: using camera phones for human-verifiable authentication. 43-56 - Michael T. Goodrich, Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik, Ersin Uzun:
Using audio in secure device pairing. 57-68 - Sven Laur, Sylvain Pasini:
User-aided data authentication. 69-86 - Jani Suomalainen, Jukka Valkonen, N. Asokan:
Standards for security associations in personal networks: a comparative analysis. 87-100 - Cynthia Kuo, Adrian Perrig, Jesse Walker:
Designing user studies for security applications: a case study with wireless network configuration. 101-109 - Robin Berthier, Michel Cukier:
An evaluation of connection characteristics for separating network attacks. 110-124 - Bing Wu, Jie Wu, Yuhong Dong:
An efficient group key management scheme for mobile ad hoc networks. 125-134
Volume 4, Number 3, 2009
- Zesheng Chen, Chao Chen, Yubin Li:
Deriving a closed-form expression for worm-scanning strategies. 135-144 - Sookyoung Lee, Krishna M. Sivalingam:
An efficient One-Time Password authentication scheme using a smart card. 145-152 - Lanier A. Watkins, Raheem A. Beyah, Cherita L. Corbett:
Using link RTT to passively detect unapproved wireless nodes. 153-163 - Konstantinos E. Drakakis, Athanasios D. Panagopoulos, Panayotis G. Cottis:
Overview of satellite communication networks security: introduction of EAP. 164-170 - Saikat Chakrabarti, Santosh Chandrasekhar, Mukesh Singhal:
An escrow-less identity-based group-key agreement protocol for dynamic peer groups. 171-188 - Sven Ehlert, Yacine Rebahi, Thomas Magedanz:
Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks. 189-200
Volume 4, Number 4, 2009
- Li Bai, Xukai Zou:
A Proactive Secret Sharing Scheme in matrix projection method. 201-209 - Hatem Bettahar, Mothanna Alkubeily, Abdelmadjid Bouabdallah:
TKS: a transition key management scheme for secure application level multicast. 210-222 - Hejiao Huang, Hélène Kirchner, Songyun Liu, Weili Wu:
Handling inheritance violation for secure interoperation of heterogeneous systems. 223-233 - Slim Rekhis, Noureddine Boudriga:
Visibility: a novel concept for characterising provable network digital evidences. 234-245 - Djamel Djenouri, Mohamed Bouamama, Othmane Mahmoudi:
Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks. 246-262 - Fei Hu, De-Cun Dong, Yang Xiao:
Attacks and countermeasures in multi-hop Cognitive Radio Networks. 263-271
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.