default search action
Security and Communication Networks, Volume 3
Volume 3, Number 1, January / February 2010
- Yang Xiang, Wanlei Zhou, Haining Wang:
Security in next generation wireless networks. 1-3 - Hahnsang Kim, Kang G. Shin:
On predictive routing of security contexts in an all-IP network. 4-15 - Hisham Dahshan, James Irvine:
A robust self-organized public key management for mobile ad hoc networks. 16-30 - Hongbo Zhou, Matt W. Mutka, Lionel M. Ni:
Secure prophet address allocation for MANETs. 31-43 - Zhiqi Tao, Baikunth Nath, Andrew Lonie:
A data clustering approach to discriminating impersonating devices in Wi-Fi networks. 44-57 - Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi:
eRIPP-FS: Enforcing privacy and security in RFID. 58-70 - Randall W. Klein, Michael A. Temple, Michael J. Mendenhall:
Application of wavelet denoising to improve OFDM-based signal detection and classification. 71-82 - Zoltán Faigl, Stefan Lindskog, Anna Brunström:
Performance evaluation of IKEv2 authentication methods in next generation wireless networks. 83-98
Volume 3, Numbers 2-3, March - June 2010
- Abderrahim Benslimane, Chadi Assi, Fred Nen-Fu Huang, Stamatios V. Kartalopoulos:
Special issue on security in mobile wireless networks. 99-101 - Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel, Kevin Borders:
malnets: large-scale malicious networks via compromised wireless access points. 102-113 - Etienne S. Coronado, Soumaya Cherkaoui:
Performance analysis of secure on-demand services for wireless vehicular networks. 114-129 - Stephen Dabideen, Bradley R. Smith, J. J. Garcia-Luna-Aceves:
An end-to-end approach to secure routing in MANETs. 130-149 - Abderrezak Rachedi, Abderrahim Benslimane:
A secure and resistant architecture against attacks for mobile ad hoc networks. 150-166 - Bo Zhu, Kui Ren, Lingyu Wang, Mourad Debbabi:
PCM: a privacy-preserving detection mechanism in mobile ad hoc networks. 167-184 - Andreas Berger, Ivan Gojmerac, Oliver Jung:
Internet security meets the IP multimedia subsystem: an overview. 185-206 - Xiaowen Chu, Yixin Jiang, Chuang Lin, Hao Yin, Bo Li:
Providing key recovery capability for mobile communications. 207-216 - Dario S. Tonesi, Luca Salgarelli, Alessandro Tortelli:
Securing the signaling plane in beyond 3G networks: analysis of performance overheads. 217-232 - Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux:
The impact of key assignment on VANET privacy. 233-249 - Li Yang, Alma Cemerlic, Xiaohui Cui:
A Dirichlet reputation system in reliable routing of wireless ad hoc network. 250-260 - Lamia Ben Azzouz, Mohamed Elhoucine Elhdhili, Farouk Kamoun:
Towards an efficient reputation based hybrid key management architecture for ad hoc networks. 261-277 - Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki:
BHIDS: a new, cluster based algorithm for black hole IDS. 278-288
Volume 3, Number 4, July / August 2010
- Tim Leinmüller, Elmar Schoch, Frank Kargl, Christian Maihöfer:
Decentralized position verification in geographic ad hoc routing. 289-302 - Fahim K. Sufi, Ibrahim Khalil, Ibrahim Habib:
Polynomial distance measurement for ECG based biometric authentication. 303-319 - Yong Wang, Byrav Ramamurthy, Xukai Zou, Yuyan Xue:
An efficient scheme for removing compromised sensor nodes from wireless sensor networks. 320-333 - Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis:
PWC: a proactive worm containment solution for enterprise networks. 334-354
Volume 3, Number 5, September / October 2010
- Isaac Z. Wu, X.-Y. Li, M. Song, C.-M. Liu:
Security in ad hoc networks and pervasive computing. 359-361 - Qian Yu, Chang N. Zhang:
A lightweight secure data transmission protocol for resource constrained devices. 362-370 - Shushan Zhao, Akshai K. Aggarwal:
PAPA-UIC: a design approach and a framework for secure mobile ad hoc networks. 371-383 - Alex X. Liu, LeRoy A. Bailey, Adithya H. Krishnamurthy:
RFIDGuard: a lightweight privacy and authentication protocol for passive RFID tags. 384-393 - Gayathri Shivaraj, Min Song, Sachin Shetty:
Using Hidden Markov Model to detect rogue access points. 394-407 - Wei-Tong Wang, Kuo-Feng Ssu, Wen-Chung Chang:
Defending Sybil attacks based on neighboring relations in wireless sensor networks. 408-420 - Daniel M. Hein, Ronald Toegl, Stefan Kraxberger:
An autonomous attestation token to secure mobile agents in disaster response. 421-438 - Jorn Lapon, Vincent Naessens, Bram Verdegem, Pieter Verhaeghe, Bart De Decker:
Building advanced applications with the Belgian eID. 439-451
Volume 3, Number 6, November / December 2010
- Theo Dimitrakos, Fabio Martinelli, Bruce Schneier:
Special issue on security and trust management for dynamic coalitions. 453-455
- Pierre de Leusse, David Brossard, Nektarios Georgalas:
Securing business operations in an SOA. 456-485 - Imad M. Abbadi, Muntaha Alawneh:
Secure information sharing for grid computing. 486-502 - Shane Balfe, Po-Wah Yau, Kenneth G. Paterson:
A guide to trust in mobile ad hoc networks. 503-516 - Khaled Hamouid, Kamel Adi:
Secure and robust threshold key management (SRKM) scheme for ad hoc networks. 517-534 - Shane Balfe, Andrew D. McDonald, Kenneth G. Paterson, Helen Phillips:
Identity crisis: on the problem of namespace design for ID-PKC and MANETs. 535-545 - Alvaro E. Arenas, Benjamin Aziz, Gheorghe Cosmin Silaghi:
Reputation management in collaborative computing systems. 546-564 - Hristo Koshutanski, Antonio Maña:
Interoperable semantic access control for highly dynamic coalitions. 565-594 - Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan, Francesco Santini:
Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria. 595-610
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.