default search action
Search dblp for Publications
export results for "toc:db/journals/scn/scn3.bht:"
@article{DBLP:journals/scn/AbbadiA10, author = {Imad M. Abbadi and Muntaha Alawneh}, title = {Secure information sharing for grid computing}, journal = {Secur. Commun. Networks}, volume = {3}, number = {6}, pages = {486--502}, year = {2010}, url = {https://doi.org/10.1002/sec.157}, doi = {10.1002/SEC.157}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AbbadiA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ArenasAS10, author = {Alvaro E. Arenas and Benjamin Aziz and Gheorghe Cosmin Silaghi}, title = {Reputation management in collaborative computing systems}, journal = {Secur. Commun. Networks}, volume = {3}, number = {6}, pages = {546--564}, year = {2010}, url = {https://doi.org/10.1002/sec.146}, doi = {10.1002/SEC.146}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ArenasAS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AzzouzEK10, author = {Lamia Ben Azzouz and Mohamed Elhoucine Elhdhili and Farouk Kamoun}, title = {Towards an efficient reputation based hybrid key management architecture for \emph{ad hoc} networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {261--277}, year = {2010}, url = {https://doi.org/10.1002/sec.130}, doi = {10.1002/SEC.130}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AzzouzEK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BalfeMPP10, author = {Shane Balfe and Andrew D. McDonald and Kenneth G. Paterson and Helen Phillips}, title = {Identity crisis: on the problem of namespace design for {ID-PKC} and MANETs}, journal = {Secur. Commun. Networks}, volume = {3}, number = {6}, pages = {535--545}, year = {2010}, url = {https://doi.org/10.1002/sec.145}, doi = {10.1002/SEC.145}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BalfeMPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BalfeYP10, author = {Shane Balfe and Po{-}Wah Yau and Kenneth G. Paterson}, title = {A guide to trust in mobile ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {6}, pages = {503--516}, year = {2010}, url = {https://doi.org/10.1002/sec.147}, doi = {10.1002/SEC.147}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BalfeYP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BenslimaneAHK10, author = {Abderrahim Benslimane and Chadi Assi and Fred Nen{-}Fu Huang and Stamatios V. Kartalopoulos}, title = {Special issue on security in mobile wireless networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {99--101}, year = {2010}, url = {https://doi.org/10.1002/sec.187}, doi = {10.1002/SEC.187}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BenslimaneAHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BergerGJ10, author = {Andreas Berger and Ivan Gojmerac and Oliver Jung}, title = {Internet security meets the {IP} multimedia subsystem: an overview}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {185--206}, year = {2010}, url = {https://doi.org/10.1002/sec.142}, doi = {10.1002/SEC.142}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BergerGJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BistarelliFOS10, author = {Stefano Bistarelli and Simon N. Foley and Barry O'Sullivan and Francesco Santini}, title = {Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria}, journal = {Secur. Commun. Networks}, volume = {3}, number = {6}, pages = {595--610}, year = {2010}, url = {https://doi.org/10.1002/sec.252}, doi = {10.1002/SEC.252}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BistarelliFOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChuJLYL10, author = {Xiaowen Chu and Yixin Jiang and Chuang Lin and Hao Yin and Bo Li}, title = {Providing key recovery capability for mobile communications}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {207--216}, year = {2010}, url = {https://doi.org/10.1002/sec.156}, doi = {10.1002/SEC.156}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChuJLYL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ContiPMS10, author = {Mauro Conti and Roberto Di Pietro and Luigi V. Mancini and Angelo Spognardi}, title = {eRIPP-FS: Enforcing privacy and security in {RFID}}, journal = {Secur. Commun. Networks}, volume = {3}, number = {1}, pages = {58--70}, year = {2010}, url = {https://doi.org/10.1002/sec.120}, doi = {10.1002/SEC.120}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ContiPMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CoronadoC10, author = {Etienne S. Coronado and Soumaya Cherkaoui}, title = {Performance analysis of secure on-demand services for wireless vehicular networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {114--129}, year = {2010}, url = {https://doi.org/10.1002/sec.134}, doi = {10.1002/SEC.134}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CoronadoC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DabideenSG10, author = {Stephen Dabideen and Bradley R. Smith and J. J. Garcia{-}Luna{-}Aceves}, title = {An end-to-end approach to secure routing in MANETs}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {130--149}, year = {2010}, url = {https://doi.org/10.1002/sec.121}, doi = {10.1002/SEC.121}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DabideenSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DahshanI10, author = {Hisham Dahshan and James Irvine}, title = {A robust self-organized public key management for mobile ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {1}, pages = {16--30}, year = {2010}, url = {https://doi.org/10.1002/sec.131}, doi = {10.1002/SEC.131}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/DahshanI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DimitrakosMS10, author = {Theo Dimitrakos and Fabio Martinelli and Bruce Schneier}, title = {Special issue on security and trust management for dynamic coalitions}, journal = {Secur. Commun. Networks}, volume = {3}, number = {6}, pages = {453--455}, year = {2010}, url = {https://doi.org/10.1002/sec.282}, doi = {10.1002/SEC.282}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DimitrakosMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FaiglLB10, author = {Zolt{\'{a}}n Faigl and Stefan Lindskog and Anna Brunstr{\"{o}}m}, title = {Performance evaluation of IKEv2 authentication methods in next generation wireless networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {1}, pages = {83--98}, year = {2010}, url = {https://doi.org/10.1002/sec.114}, doi = {10.1002/SEC.114}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FaiglLB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HaasHL10, author = {Jason J. Haas and Yih{-}Chun Hu and Kenneth P. Laberteaux}, title = {The impact of key assignment on {VANET} privacy}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {233--249}, year = {2010}, url = {https://doi.org/10.1002/sec.143}, doi = {10.1002/SEC.143}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HaasHL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HamouidA10, author = {Khaled Hamouid and Kamel Adi}, title = {Secure and robust threshold key management {(SRKM)} scheme for \emph{ad hoc} networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {6}, pages = {517--534}, year = {2010}, url = {https://doi.org/10.1002/sec.199}, doi = {10.1002/SEC.199}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HamouidA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HeinTK10, author = {Daniel M. Hein and Ronald Toegl and Stefan Kraxberger}, title = {An autonomous attestation token to secure mobile agents in disaster response}, journal = {Secur. Commun. Networks}, volume = {3}, number = {5}, pages = {421--438}, year = {2010}, url = {https://doi.org/10.1002/sec.196}, doi = {10.1002/SEC.196}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HeinTK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JhiLLGJK10, author = {Yoon{-}chan Jhi and Peng Liu and Lunquan Li and Qijun Gu and Jiwu Jing and George Kesidis}, title = {{PWC:} a proactive worm containment solution for enterprise networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {4}, pages = {334--354}, year = {2010}, url = {https://doi.org/10.1002/sec.112}, doi = {10.1002/SEC.112}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JhiLLGJK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KimS10, author = {Hahnsang Kim and Kang G. Shin}, title = {On predictive routing of security contexts in an all-IP network}, journal = {Secur. Commun. Networks}, volume = {3}, number = {1}, pages = {4--15}, year = {2010}, url = {https://doi.org/10.1002/sec.135}, doi = {10.1002/SEC.135}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KimS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KleinTM10, author = {Randall W. Klein and Michael A. Temple and Michael J. Mendenhall}, title = {Application of wavelet denoising to improve OFDM-based signal detection and classification}, journal = {Secur. Commun. Networks}, volume = {3}, number = {1}, pages = {71--82}, year = {2010}, url = {https://doi.org/10.1002/sec.115}, doi = {10.1002/SEC.115}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KleinTM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KoshutanskiM10, author = {Hristo Koshutanski and Antonio Ma{\~{n}}a}, title = {Interoperable semantic access control for highly dynamic coalitions}, journal = {Secur. Commun. Networks}, volume = {3}, number = {6}, pages = {565--594}, year = {2010}, url = {https://doi.org/10.1002/sec.148}, doi = {10.1002/SEC.148}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KoshutanskiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LaponNVVD10, author = {Jorn Lapon and Vincent Naessens and Bram Verdegem and Pieter Verhaeghe and Bart De Decker}, title = {Building advanced applications with the Belgian eID}, journal = {Secur. Commun. Networks}, volume = {3}, number = {5}, pages = {439--451}, year = {2010}, url = {https://doi.org/10.1002/sec.192}, doi = {10.1002/SEC.192}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LaponNVVD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LeinmullerSKM10, author = {Tim Leinm{\"{u}}ller and Elmar Schoch and Frank Kargl and Christian Maih{\"{o}}fer}, title = {Decentralized position verification in geographic \emph{ad hoc} routing}, journal = {Secur. Commun. Networks}, volume = {3}, number = {4}, pages = {289--302}, year = {2010}, url = {https://doi.org/10.1002/sec.56}, doi = {10.1002/SEC.56}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LeinmullerSKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LeusseBG10, author = {Pierre de Leusse and David Brossard and Nektarios Georgalas}, title = {Securing business operations in an {SOA}}, journal = {Secur. Commun. Networks}, volume = {3}, number = {6}, pages = {456--485}, year = {2010}, url = {https://doi.org/10.1002/sec.188}, doi = {10.1002/SEC.188}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LeusseBG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuBK10, author = {Alex X. Liu and LeRoy A. Bailey and Adithya H. Krishnamurthy}, title = {RFIDGuard: a lightweight privacy and authentication protocol for passive {RFID} tags}, journal = {Secur. Commun. Networks}, volume = {3}, number = {5}, pages = {384--393}, year = {2010}, url = {https://doi.org/10.1002/sec.138}, doi = {10.1002/SEC.138}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuBK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RachediB10, author = {Abderrezak Rachedi and Abderrahim Benslimane}, title = {A secure and resistant architecture against attacks for mobile ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {150--166}, year = {2010}, url = {https://doi.org/10.1002/sec.116}, doi = {10.1002/SEC.116}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RachediB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RoyCC10, author = {Debdutta Barman Roy and Rituparna Chaki and Nabendu Chaki}, title = {{BHIDS:} a new, cluster based algorithm for black hole {IDS}}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {278--288}, year = {2010}, url = {https://doi.org/10.1002/sec.144}, doi = {10.1002/SEC.144}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RoyCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShivarajSS10, author = {Gayathri Shivaraj and Min Song and Sachin Shetty}, title = {Using Hidden Markov Model to detect rogue access points}, journal = {Secur. Commun. Networks}, volume = {3}, number = {5}, pages = {394--407}, year = {2010}, url = {https://doi.org/10.1002/sec.190}, doi = {10.1002/SEC.190}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShivarajSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SufiKH10, author = {Fahim K. Sufi and Ibrahim Khalil and Ibrahim Habib}, title = {Polynomial distance measurement for {ECG} based biometric authentication}, journal = {Secur. Commun. Networks}, volume = {3}, number = {4}, pages = {303--319}, year = {2010}, url = {https://doi.org/10.1002/sec.76}, doi = {10.1002/SEC.76}, timestamp = {Tue, 23 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/SufiKH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TaoNL10, author = {Zhiqi Tao and Baikunth Nath and Andrew Lonie}, title = {A data clustering approach to discriminating impersonating devices in Wi-Fi networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {1}, pages = {44--57}, year = {2010}, url = {https://doi.org/10.1002/sec.141}, doi = {10.1002/SEC.141}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TaoNL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TonesiST10, author = {Dario S. Tonesi and Luca Salgarelli and Alessandro Tortelli}, title = {Securing the signaling plane in beyond 3G networks: analysis of performance overheads}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {217--232}, year = {2010}, url = {https://doi.org/10.1002/sec.153}, doi = {10.1002/SEC.153}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TonesiST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TraynorBEMB10, author = {Patrick Traynor and Kevin R. B. Butler and William Enck and Patrick D. McDaniel and Kevin Borders}, title = {malnets: large-scale malicious networks \emph{via} compromised wireless access points}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {102--113}, year = {2010}, url = {https://doi.org/10.1002/sec.149}, doi = {10.1002/SEC.149}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/TraynorBEMB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangRZX10, author = {Yong Wang and Byrav Ramamurthy and Xukai Zou and Yuyan Xue}, title = {An efficient scheme for removing compromised sensor nodes from wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {4}, pages = {320--333}, year = {2010}, url = {https://doi.org/10.1002/sec.89}, doi = {10.1002/SEC.89}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangRZX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangSC10, author = {Wei{-}Tong Wang and Kuo{-}Feng Ssu and Wen{-}Chung Chang}, title = {Defending Sybil attacks based on neighboring relations in wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {5}, pages = {408--420}, year = {2010}, url = {https://doi.org/10.1002/sec.197}, doi = {10.1002/SEC.197}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WuLSL10, author = {Isaac Z. Wu and X.{-}Y. Li and M. Song and C.{-}M. Liu}, title = {Security in \emph{ad hoc} networks and pervasive computing}, journal = {Secur. Commun. Networks}, volume = {3}, number = {5}, pages = {359--361}, year = {2010}, url = {https://doi.org/10.1002/sec.202}, doi = {10.1002/SEC.202}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WuLSL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XiangZW10, author = {Yang Xiang and Wanlei Zhou and Haining Wang}, title = {Security in next generation wireless networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {1}, pages = {1--3}, year = {2010}, url = {https://doi.org/10.1002/sec.151}, doi = {10.1002/SEC.151}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XiangZW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangCC10, author = {Li Yang and Alma Cemerlic and Xiaohui Cui}, title = {A Dirichlet reputation system in reliable routing of wireless \emph{ad hoc} network}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {250--260}, year = {2010}, url = {https://doi.org/10.1002/sec.173}, doi = {10.1002/SEC.173}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuZ10, author = {Qian Yu and Chang N. Zhang}, title = {A lightweight secure data transmission protocol for resource constrained devices}, journal = {Secur. Commun. Networks}, volume = {3}, number = {5}, pages = {362--370}, year = {2010}, url = {https://doi.org/10.1002/sec.140}, doi = {10.1002/SEC.140}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YuZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoA10, author = {Shushan Zhao and Akshai K. Aggarwal}, title = {{PAPA-UIC:} a design approach and a framework for secure mobile \emph{ad hoc} networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {5}, pages = {371--383}, year = {2010}, url = {https://doi.org/10.1002/sec.150}, doi = {10.1002/SEC.150}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhaoA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhouMN10, author = {Hongbo Zhou and Matt W. Mutka and Lionel M. Ni}, title = {Secure prophet address allocation for MANETs}, journal = {Secur. Commun. Networks}, volume = {3}, number = {1}, pages = {31--43}, year = {2010}, url = {https://doi.org/10.1002/sec.126}, doi = {10.1002/SEC.126}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhouMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhuRWD10, author = {Bo Zhu and Kui Ren and Lingyu Wang and Mourad Debbabi}, title = {{PCM:} a privacy-preserving detection mechanism in mobile \emph{ad hoc} networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {167--184}, year = {2010}, url = {https://doi.org/10.1002/sec.122}, doi = {10.1002/SEC.122}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhuRWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.