


Остановите войну!
for scientists:


default search action
International Journal of Security and Networks (IJSN), Volume 3
Volume 3, Number 1, 2008
- Panayiotis Kotzanikolaou
, Dimitrios D. Vergados, Giannis Stergiou, Emmanouil Magkos:
Multilayer key establishment for large-scale sensor networks. 1-9 - Weichao Wang, Jiejun Kong, Bharat K. Bhargava, Mario Gerla:
Visualisation of wormholes in underwater sensor networks: a distributed approach. 10-23 - Walter J. Scheirer, Mooi Choo Chuah:
Syntax vs. semantics: competing approaches to dynamic network intrusion detection. 24-35 - Andrew Burt, Michael Darschewski, Indrajit Ray, Ramakrishna Thurimella, Hailin Wu:
Origins: an approach to trace fast spreading worms to their roots. 36-46 - Xukai Zou, Yogesh Karandikar:
A novel Conference Key Management solution for Secure Dynamic Conferencing. 47-53 - Mahdi Asadpour, Behnam Sattarzadeh, Ali Movaghar:
Anonymous authentication protocol for GSM networks. 54-62 - Fei Hu, Amish Rughoonundon, Laura Celentano:
Towards a realistic testbed for wireless network reliability and security performance studies. 63-77
Volume 3, Number 2, 2008
- Indrajit Ray, Nayot Poolsappasit:
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents. 80-94 - Tim Kilpatrick, Jesús González, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi:
Forensic analysis of SCADA systems and networks. 95-102 - Eric Cronin, Micah Sherr, Matt Blaze:
On the (un)reliability of eavesdropping. 103-113 - James S. Okolica, Gilbert L. Peterson, Robert F. Mills:
Using PLSI-U to detect insider threats by datamining e-mail. 114-121 - Xiaodong Lin, Xinhua Ling, Haojin Zhu
, Pin-Han Ho, Xuemin Shen
:
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks. 122-132 - Yacine Challal
, Said Gharout, Abdelmadjid Bouabdallah, Hatem Bettahar:
Adaptive clustering for scalable key management in dynamic group communications. 133-146
Volume 3, Number 3, 2008
- Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy:
Formal modelling and analysis of XML firewall for service-oriented systems. 147-160 - Adel Bouhoula, Zouheir Trabelsi, Ezedin Barka, Mohammed Anis Benelbahri:
Firewall filtering rules analysis for anomalies detection. 161-172 - Feng Li, Avinash Srinivasan, Jie Wu:
PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks. 173-182 - Xiaoqi Ma
, Xiaochun Cheng
:
Verifying security protocols by knowledge analysis. 183-192 - Benjamin Uphoff, Johnny S. Wong:
An agent-based framework for intrusion detection alert verification and event correlation. 193-200 - Somanath Tripathy, Sukumar Nandi
:
Secure user-identification and key distribution scheme preserving anonymity. 201-205 - Fagen Li, Xiangjun Xin, Yupu Hu:
ID-based threshold proxy signcryption scheme from bilinear pairings. 206-215
Volume 3, Number 4, 2008
- Liran Ma
, Amin Y. Teymorian, Kai Xing, Ding-Zhu Du:
An one-way function based framework for pairwise key establishment in sensor networks. 217-225 - Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li:
Clique-based group key assignment in Wireless Sensor Networks. 226-239 - Cheng-Kuan Hsieh, Jyh-Cheng Chen, Yi-Bing Lin, Kuei-Hui Chen, Hsin-Yu Liao, Ching-Feng Liang:
NTP-DownloadT: a conformance test tool for secured mobile download services. 240-249 - Michael Sadowitz, Shahram Latifi, David J. Walker:
An iris and retina multimodal biometric system. 250-257 - Ramanarayana Kandikattu, Lillykutty Jacob:
Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks. 258-274

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.