- Zhiqi Tao, Baikunth Nath, Andrew Lonie:
A data clustering approach to discriminating impersonating devices in Wi-Fi networks. Secur. Commun. Networks 3(1): 44-57 (2010) - Dario S. Tonesi, Luca Salgarelli, Alessandro Tortelli:
Securing the signaling plane in beyond 3G networks: analysis of performance overheads. Secur. Commun. Networks 3(2-3): 217-232 (2010) - Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel, Kevin Borders:
malnets: large-scale malicious networks via compromised wireless access points. Secur. Commun. Networks 3(2-3): 102-113 (2010) - Yong Wang, Byrav Ramamurthy, Xukai Zou, Yuyan Xue:
An efficient scheme for removing compromised sensor nodes from wireless sensor networks. Secur. Commun. Networks 3(4): 320-333 (2010) - Wei-Tong Wang, Kuo-Feng Ssu, Wen-Chung Chang:
Defending Sybil attacks based on neighboring relations in wireless sensor networks. Secur. Commun. Networks 3(5): 408-420 (2010) - Isaac Z. Wu, X.-Y. Li, M. Song, C.-M. Liu:
Security in ad hoc networks and pervasive computing. Secur. Commun. Networks 3(5): 359-361 (2010) - Yang Xiang, Wanlei Zhou, Haining Wang:
Security in next generation wireless networks. Secur. Commun. Networks 3(1): 1-3 (2010) - Li Yang, Alma Cemerlic, Xiaohui Cui:
A Dirichlet reputation system in reliable routing of wireless ad hoc network. Secur. Commun. Networks 3(2-3): 250-260 (2010) - Qian Yu, Chang N. Zhang:
A lightweight secure data transmission protocol for resource constrained devices. Secur. Commun. Networks 3(5): 362-370 (2010) - Shushan Zhao, Akshai K. Aggarwal:
PAPA-UIC: a design approach and a framework for secure mobile ad hoc networks. Secur. Commun. Networks 3(5): 371-383 (2010) - Hongbo Zhou, Matt W. Mutka, Lionel M. Ni:
Secure prophet address allocation for MANETs. Secur. Commun. Networks 3(1): 31-43 (2010) - Bo Zhu, Kui Ren, Lingyu Wang, Mourad Debbabi:
PCM: a privacy-preserving detection mechanism in mobile ad hoc networks. Secur. Commun. Networks 3(2-3): 167-184 (2010)