default search action
International Journal of Security and Networks, Volume 11
Volume 11, Numbers 1/2, 2016
- Sharmila Subudhi, Suvasini Panigrahi:
Use of fuzzy clustering and support vector machine for detecting fraud in mobile telecommunication networks. 3-11 - Yanan Liu, Lein Harn, Lei Mao, Zhangliang Xiong:
Full-healing group-key distribution in online social networks. 12-24 - Rupesh Nomula, Mayssaa El Rifai, Pramode K. Verma:
Multi-photon tolerant protocols for quantum secure communication in wireless standards. 25-36 - Abhishek Parakh, Pramode K. Verma, Mahadevan Subramaniam:
Improving efficiency of quantum key distribution with probabilistic measurements. 37-47 - Priyanka Dadhich, Kamlesh Dutta, Mahesh Chandra Govil:
Detection of slanders through Euclidean distance similarity assessment for securing e-commerce agents in P2P decentralised electronic communities. 48-65 - Zhijiang Chen, Linqiang Ge, Guobin Xu, Wei Yu, Robert F. Erbacher, Hasan Cam, Nnanna Ekedebe:
A threat monitoring system in enterprise networks with smart mobiles. 66-81 - Geethapriya Thamilarasu:
iDetect: an intelligent intrusion detection system for wireless body area networks. 82-93 - P. Annadurai, S. Yazhini:
Optimising on trust value-based clustering using trust evaluation scheme for ad hoc network. 94-105
Volume 11, Number 3, 2016
- Mohamed Amine Ferrag, Mehdi Nafa, Salim Ghanemi:
EPSA: an efficient and privacy-preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks. 107-125 - Zhengping Jin, Qing Wang, Zhongxian Li:
A formal construction of certificateless proxy multi-signature scheme. 126-139 - Kamel Karoui, Fakher Ben Ftima, Henda Ben Ghézala:
A framework for firewalls policy representativeness testing based on classification and reversible metrics. 140-159 - Hala Abukhalaf, Jianxin Wang, Shigeng Zhang:
Distance outlier detection with a mobile beacon in wireless sensor networks localisation. 160-166 - Sung-Hyun Baek, Jong-Wook Jang:
Design and implementation of the smart blackbox system. 167-174
Volume 11, Number 4, 2016
- Abubaker Wahaballa, Hu Xiong, Fagen Li, Zhen Qin, Zhiguang Qin:
Secure mobile agent-based English auction protocol using identity-based signature scheme. 175-187 - Feng Shao, Shun Zhang, Hong Zhong, Runhua Shi, Jie Cui:
Keyword search protocol with privacy preservation using ID-based proxy reencryption. 188-195 - Ye Bi:
A hybrid PSO-SVM model for network intrusion detection. 196-203 - Gao Ren, Wang Hui, Zhang Yun:
A multi-channel MAC protocol with power control in the distributed cognitive radio networks. 204-212 - Pranav Subramaniam, Abhishek Parakh:
A quantum Diffie-Hellman protocol. 213-223 - Zesheng Chen, Chao Chen:
Characterising heterogeneity in vulnerable hosts on worm propagation. 224-234 - Pengju He, Xiaomeng Chen, Huazhi Zeng:
Wireless sensor network for multi-target detection algorithm based on blind source separation. 235-241
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.