default search action
International Journal of Security and Networks (IJSN), Volume 2
Volume 2, Number 1/2, 2007
- Ruidong Li, Jie Li, Hsiao-Hwa Chen:
DKMS: distributed hierarchical access control for multimedia networks. 3-10 - Pitipatana Sakarindr, Nirwan Ansari:
Adaptive trust-based anonymous network. 11-26 - Robert A. Malaney:
Securing Wi-Fi networks with position verification: extended version. 27-36 - Fangting Sun, Mark A. Shayman:
On pairwise connectivity of wireless multihop networks. 37-49 - Ozgun Erdogan, Pei Cao:
Hash-AV: fast virus signature scanning by cache-resident filters. 50-59 - Paul Rabinovich, Robert Simon:
Secure message delivery in publish/subscribe networks using overlay multicast. 60-70 - Zesheng Chen, Chuanyi Ji:
Optimal worm-scanning method using vulnerable-host distributions. 71-80 - Jianping Pan, Lin Cai, Xuemin Shen:
Vulnerabilities in distance-indexed IP traceback schemes. 81-94 - Turgay Korkmaz, Chao Gong, Kamil Saraç, Sandra G. Dykes:
Single packet IP traceback in AS-level partial deployment scenario. 95-108 - Hui Ling, Taieb Znati:
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks. 109-121 - N. Sertac Artan, H. Jonathan Chao:
Design and analysis of a multipacket signature detection system. 122-136 - Ye Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Analysis of flow-correlation attacks in anonymity network. 137-153 - Qijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu:
Defence against packet injection in ad hoc networks. 154-169
Volume 2, Number 3/4, 2007
- Christophe Tartary, Huaxiong Wang:
Efficient multicast stream authentication for the fully adversarial network model. 175-191 - Raghav Bhaskar, Javier Herranz, Fabien Laguillaumie:
Aggregate designated verifier signatures and application to secure routing. 192-201 - Hung-Yuan Hsu, Sencun Zhu, Ali R. Hurson:
LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. 202-215 - Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfredo Ferreira Loureiro, Ricardo Dahab:
On the design of secure protocols for hierarchical sensor networks. 216-227 - Harris E. Michail, George A. Panagiotakopoulos, Vasilis N. Thanasoulis, Athanasios Kakarountas, Costas E. Goutis:
Server side hashing core exceeding 3 Gbps of throughput. 228-238 - Katrin Hoeper, Guang Gong:
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks. 239-250 - Zhaohui Cheng, Liqun Chen:
On security proof of McCullagh?Barreto's key agreement protocol and its variants. 251-259 - Kevin M. Finnigin, Barry E. Mullins, Richard A. Raines, Henry B. Potoczny:
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks. 260-271 - Dijiang Huang:
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. 272-283 - Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval:
Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol. 284-296
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.