![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
International Journal of Security and Networks, Volume 6
Volume 6, Number 1, 2011
- Deepa Kundur, Xianyong Feng, Salman Mashayekh, Shan Liu, Takis Zourntos, Karen L. Butler-Purry:
Towards modelling the impact of cyber attacks on a smart grid. 2-13 - Georgios Kalogridis, Stojan Z. Denic, Tim A. Lewis, Rafael Cepeda:
Privacy protection system and metrics for hiding electrical events. 14-27 - Fengjun Li
, Bo Luo
, Peng Liu:
Secure and privacy-preserving information aggregation for smart grids. 28-39 - Jianqing Zhang, Carl A. Gunter:
Application-aware secure multicast for power grid communications. 40-52 - Benjamin W. P. Ramsey, Barry E. Mullins, Ryan W. Thomas, Todd R. Andel:
Subjective audio quality over a secure IEEE 802.11n network. 53-63
Volume 6, Numbers 2/3, 2011
- Mrinmoy Barua, Xiaohui Liang, Rongxing Lu, Xuemin Shen
:
ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing. 67-76 - Neeraj Jaggi, Umesh Marappa Reddy, Rajiv Bagai:
A three dimensional sender anonymity metric. 77-89 - Madhu J. Sharma, Victor C. M. Leung
:
Improved IP Multimedia Subsystem authentication mechanism for 3G-WLAN networks. 90-100 - Ahmed Osama Fathy Atya, Tamer A. ElBatt, Moustafa Youssef
:
A source authentication scheme using network coding. 101-111 - Ningning Cheng, Kannan Govindan
, Prasant Mohapatra:
Rendezvous based trust propagation to enhance distributed network security. 112-122 - Li Liu, Yang Xiao
, Jingyuan Zhang, Andrew Faulkner, Keith Weber:
Hidden information in Microsoft Word. 123-135 - Sherman S. M. Chow
, Siu-Ming Yiu:
Exclusion-intersection encryption. 136-146 - David J. Walker, Shahram Latifi:
Partial iris and recognition as a viable biometric scheme. 147-152 - Abdelrahman Desoky:
Edustega: an Education-Centric Steganography methodology. 153-173 - Nana K. Ampah, Cajetan M. Akujuobi, Matthew N. O. Sadiku, Shumon Alam:
An intrusion detection technique based on continuous binary communication channels. 174-180
Volume 6, Number 4, 2011
- Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
Is that you? Authentication in a network without identities. 181-190 - Qi Chai, Guang Gong:
On the (in)security of two Joint Encryption and Error Correction schemes. 191-200 - Shensheng Tang, Wei Li:
An epidemic model with adaptive virus spread control for Wireless Sensor Networks. 201-210 - Guoqi Luo, K. P. Subbalakshmi:
KL-sense secure image steganography. 211-225 - Wei Chang, Jie Wu, Chiu C. Tan:
Friendship-based location privacy in Mobile Social Networks. 226-236 - Xinxin Zhao, Lingjun Li, Guoliang Xue:
Authenticating strangers in Online Social Networks. 237-248
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.