


default search action
Journal of Cyber Security and Mobility, Volume 1
Volume 1, Number 1, January 2012
- Lin Cai, Roberto Rojas-Cessa:
Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme. J. Cyber Secur. Mobil. 1(1) (2012) - Jing Chen, Marcus Wong:
Security Implications and Considerations for Femtocells. J. Cyber Secur. Mobil. 1(1) (2012) - Christoph Thuemmler, Lu Fan, William J. Buchanan, Owen Lo, Elias Ekonomou, Abou Sofyane Khedim:
E-Health: Chances and Challenges of Distributed, Service oriented Architectures. J. Cyber Secur. Mobil. 1(1) (2012) - Cristina Comaniciu:
On Energy-Security Tradeoffs and Cooperation for Wireless Ad Hoc Networks. J. Cyber Secur. Mobil. 1(1) (2012) - Pranav M. Pawar, Rasmus H. Nielsen, Neeli R. Prasad, Shingo Ohmori, Ramjee Prasad:
Behavioural Modelling of WSN MAC Layer Security Attacks: A Sequential UML Approach. J. Cyber Secur. Mobil. 1(1) (2012) - Zhenxing Wang, Mable P. Fok, Paul R. Prucnal:
Physical Encoding in Optical Layer Security. J. Cyber Secur. Mobil. 1(1) (2012) - Ajay Rajkumar:
Evolution of Mobility in Future Wireless Networks. J. Cyber Secur. Mobil. 1(1) (2012) - Giovanni Di Crescenzo, Yibei Ling, Tao Zhang, Stanley Pietrowicz:
Non-Interactive Detection of Malicious Vehicular Network Data. J. Cyber Secur. Mobil. 1(1) (2012)
Volume 1, Numbers 2-3, April 2012
- Henrik Tange, Birger Andersen:
SPDH - A Secure Plain Diffie-Hellman Algorithm. J. Cyber Secur. Mobil. 1(2-3) (2012) - Chetan Nanjunda Mathur, Mohamed A. Haleem, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Impact of Constraints on the Complexity and Performance of Channel Assignment in Multi-Hop Wireless Networks. J. Cyber Secur. Mobil. 1(2-3) (2012) - Samant Khajuria, Birger Andersen:
Authenticated Encryption for Low-Power Reconfigurable Wireless Devices. J. Cyber Secur. Mobil. 1(2-3) (2012) - Pranav M. Pawar, Rasmus H. Nielsen, Neeli R. Prasad, Shingo Ohmori, Ramjee Prasad:
Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks. J. Cyber Secur. Mobil. 1(2-3) (2012) - Vandana Milind Rohokale, Neeli Rashmi Prasad, Ramjee Prasad:
Cooperative Wireless Communications and Physical Layer Security: State-of-the-Art. J. Cyber Secur. Mobil. 1(2-3) (2012) - Yi Deng, Sandeep K. Shukla:
Vulnerabilities and Countermeasures - A Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid. J. Cyber Secur. Mobil. 1(2-3) (2012) - Debabrata Nayak:
Understanding the Security, Privacy and Trust Challenges of Cloud Computing. J. Cyber Secur. Mobil. 1(2-3) (2012)
Volume 1, Number 4, October 2012
- Arnab Dey, Balaji Rajappa, Lakshman Bana:
Realization of Interworking in LTE Roaming Using a Diameter-Based Interworking Function. J. Cyber Secur. Mobil. 1(4) (2012) - Parikshit N. Mahalle, Bayu Anggorojati, Neeli R. Prasad, Ramjee Prasad:
Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things. J. Cyber Secur. Mobil. 1(4) (2012) - Arnaud Henry-Labordère:
The Number continuity service, Part I GSM <-> Satellite phone. J. Cyber Secur. Mobil. 1(4) (2012) - Geir M. Køien:
Mobility and Spatio-Temporal Exposure Control Exposure Control as a Primary Security and Privacy Tool Regarding Mobility, Roaming Privacy and Home Control. J. Cyber Secur. Mobil. 1(4) (2012)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.