- 2010
- Imad M. Abbadi, Muntaha Alawneh:
Secure information sharing for grid computing. Secur. Commun. Networks 3(6): 486-502 (2010) - Alvaro E. Arenas, Benjamin Aziz, Gheorghe Cosmin Silaghi:
Reputation management in collaborative computing systems. Secur. Commun. Networks 3(6): 546-564 (2010) - Lamia Ben Azzouz, Mohamed Elhoucine Elhdhili, Farouk Kamoun:
Towards an efficient reputation based hybrid key management architecture for ad hoc networks. Secur. Commun. Networks 3(2-3): 261-277 (2010) - Shane Balfe, Andrew D. McDonald, Kenneth G. Paterson, Helen Phillips:
Identity crisis: on the problem of namespace design for ID-PKC and MANETs. Secur. Commun. Networks 3(6): 535-545 (2010) - Shane Balfe, Po-Wah Yau, Kenneth G. Paterson:
A guide to trust in mobile ad hoc networks. Secur. Commun. Networks 3(6): 503-516 (2010) - Abderrahim Benslimane, Chadi Assi, Fred Nen-Fu Huang, Stamatios V. Kartalopoulos:
Special issue on security in mobile wireless networks. Secur. Commun. Networks 3(2-3): 99-101 (2010) - Andreas Berger, Ivan Gojmerac, Oliver Jung:
Internet security meets the IP multimedia subsystem: an overview. Secur. Commun. Networks 3(2-3): 185-206 (2010) - Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan, Francesco Santini:
Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria. Secur. Commun. Networks 3(6): 595-610 (2010) - Xiaowen Chu, Yixin Jiang, Chuang Lin, Hao Yin, Bo Li:
Providing key recovery capability for mobile communications. Secur. Commun. Networks 3(2-3): 207-216 (2010) - Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi:
eRIPP-FS: Enforcing privacy and security in RFID. Secur. Commun. Networks 3(1): 58-70 (2010) - Etienne S. Coronado, Soumaya Cherkaoui:
Performance analysis of secure on-demand services for wireless vehicular networks. Secur. Commun. Networks 3(2-3): 114-129 (2010) - Stephen Dabideen, Bradley R. Smith, J. J. Garcia-Luna-Aceves:
An end-to-end approach to secure routing in MANETs. Secur. Commun. Networks 3(2-3): 130-149 (2010) - Hisham Dahshan, James Irvine:
A robust self-organized public key management for mobile ad hoc networks. Secur. Commun. Networks 3(1): 16-30 (2010) - Theo Dimitrakos, Fabio Martinelli, Bruce Schneier:
Special issue on security and trust management for dynamic coalitions. Secur. Commun. Networks 3(6): 453-455 (2010) - Zoltán Faigl, Stefan Lindskog, Anna Brunström:
Performance evaluation of IKEv2 authentication methods in next generation wireless networks. Secur. Commun. Networks 3(1): 83-98 (2010) - Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux:
The impact of key assignment on VANET privacy. Secur. Commun. Networks 3(2-3): 233-249 (2010) - Khaled Hamouid, Kamel Adi:
Secure and robust threshold key management (SRKM) scheme for ad hoc networks. Secur. Commun. Networks 3(6): 517-534 (2010) - Daniel M. Hein, Ronald Toegl, Stefan Kraxberger:
An autonomous attestation token to secure mobile agents in disaster response. Secur. Commun. Networks 3(5): 421-438 (2010) - Yoon-chan Jhi, Peng Liu, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis:
PWC: a proactive worm containment solution for enterprise networks. Secur. Commun. Networks 3(4): 334-354 (2010) - Hahnsang Kim, Kang G. Shin:
On predictive routing of security contexts in an all-IP network. Secur. Commun. Networks 3(1): 4-15 (2010) - Randall W. Klein, Michael A. Temple, Michael J. Mendenhall:
Application of wavelet denoising to improve OFDM-based signal detection and classification. Secur. Commun. Networks 3(1): 71-82 (2010) - Hristo Koshutanski, Antonio Maña:
Interoperable semantic access control for highly dynamic coalitions. Secur. Commun. Networks 3(6): 565-594 (2010) - Jorn Lapon, Vincent Naessens, Bram Verdegem, Pieter Verhaeghe, Bart De Decker:
Building advanced applications with the Belgian eID. Secur. Commun. Networks 3(5): 439-451 (2010) - Tim Leinmüller, Elmar Schoch, Frank Kargl, Christian Maihöfer:
Decentralized position verification in geographic ad hoc routing. Secur. Commun. Networks 3(4): 289-302 (2010) - Pierre de Leusse, David Brossard, Nektarios Georgalas:
Securing business operations in an SOA. Secur. Commun. Networks 3(6): 456-485 (2010) - Alex X. Liu, LeRoy A. Bailey, Adithya H. Krishnamurthy:
RFIDGuard: a lightweight privacy and authentication protocol for passive RFID tags. Secur. Commun. Networks 3(5): 384-393 (2010) - Abderrezak Rachedi, Abderrahim Benslimane:
A secure and resistant architecture against attacks for mobile ad hoc networks. Secur. Commun. Networks 3(2-3): 150-166 (2010) - Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki:
BHIDS: a new, cluster based algorithm for black hole IDS. Secur. Commun. Networks 3(2-3): 278-288 (2010) - Gayathri Shivaraj, Min Song, Sachin Shetty:
Using Hidden Markov Model to detect rogue access points. Secur. Commun. Networks 3(5): 394-407 (2010) - Fahim K. Sufi, Ibrahim Khalil, Ibrahim Habib:
Polynomial distance measurement for ECG based biometric authentication. Secur. Commun. Networks 3(4): 303-319 (2010)