Search dblp for Publications

export results for "toc:db/journals/ijsn/ijsn5.bht:"

 download as .bib file

@article{DBLP:journals/ijsn/AbbesBR10,
  author       = {Tarek Abbes and
                  Adel Bouhoula and
                  Micha{\"{e}}l Rusinowitch},
  title        = {Efficient decision tree for protocol analysis in intrusion detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {4},
  pages        = {220--235},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.037661},
  doi          = {10.1504/IJSN.2010.037661},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AbbesBR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AzevedoF10,
  author       = {Susana Garrido Azevedo and
                  Jo{\~{a}}o J. Ferreira},
  title        = {Radio frequency identification: a case study of healthcare organisations},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {147--155},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032213},
  doi          = {10.1504/IJSN.2010.032213},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/AzevedoF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenCW10,
  author       = {Zesheng Chen and
                  Chao Chen and
                  Qian Wang},
  title        = {On the scalability of Delay-Tolerant Botnets},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {4},
  pages        = {248--258},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.037664},
  doi          = {10.1504/IJSN.2010.037664},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenCW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DaltonEMR10,
  author       = {George C. Dalton II and
                  Kenneth S. Edge and
                  Robert F. Mills and
                  Richard A. Raines},
  title        = {Analysing security risks in computer and Radio Frequency Identification
                  {(RFID)} networks using attack and protection trees},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {87--95},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032207},
  doi          = {10.1504/IJSN.2010.032207},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/DaltonEMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DongHRW10,
  author       = {Yuhong Dong and
                  Sam Hsu and
                  Saeed Rajput and
                  Bing Wu},
  title        = {Experimental analysis of application-level intrusion detection algorithms},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {198--205},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032218},
  doi          = {10.1504/IJSN.2010.032218},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/DongHRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GuoMZL10,
  author       = {Hua Guo and
                  Yi Mu and
                  Xiyong Zhang and
                  Zhoujun Li},
  title        = {Enhanced McCullagh-Barreto identity-based key exchange protocols with
                  master key forward security},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {173--187},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032216},
  doi          = {10.1504/IJSN.2010.032216},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GuoMZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GuoP10,
  author       = {Yinghua Guo and
                  Sylvie Perreau},
  title        = {Detect DDoS flooding attacks in mobile ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {4},
  pages        = {259--269},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.037666},
  doi          = {10.1504/IJSN.2010.037666},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GuoP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HsiaoH10,
  author       = {Yu{-}Kai Hsiao and
                  Ren{-}Junn Hwang},
  title        = {An efficient secure data dissemination scheme for grid structure Wireless
                  Sensor Networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {26--34},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030720},
  doi          = {10.1504/IJSN.2010.030720},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HsiaoH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HuangS10,
  author       = {Shih{-}I Huang and
                  Shiuhpyng Shieh},
  title        = {Authentication and secret search mechanisms for RFID-aware wireless
                  sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {15--25},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030719},
  doi          = {10.1504/IJSN.2010.030719},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HuangS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HutterPF10,
  author       = {Michael Hutter and
                  Thomas Plos and
                  Martin Feldhofer},
  title        = {On the security of {RFID} devices against implementation attacks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {106--118},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032209},
  doi          = {10.1504/IJSN.2010.032209},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HutterPF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ImasakiZJ10,
  author       = {Yasuhiro Imasaki and
                  Yongbing Zhang and
                  Yusheng Ji},
  title        = {Secure and efficient data transmission in {RFID} sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {119--127},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032210},
  doi          = {10.1504/IJSN.2010.032210},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ImasakiZJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LengLMM10,
  author       = {Xuefei Leng and
                  Yuanhung Lien and
                  Keith Mayes and
                  Konstantinos Markantonakis},
  title        = {An {RFID} grouping proof protocol exploiting anti-collision algorithm
                  for subgroup dividing},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {79--86},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032206},
  doi          = {10.1504/IJSN.2010.032206},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LengLMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MalligaT10,
  author       = {S. Malliga and
                  A. Tamilarasi},
  title        = {A backpressure technique for filtering spoofed traffic at upstream
                  routers},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {3--14},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030718},
  doi          = {10.1504/IJSN.2010.030718},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MalligaT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Raad10,
  author       = {Muhammad Wassim Raad},
  title        = {A ubiquitous mobile telemedicine system for the elderly using {RFID}},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {156--164},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032214},
  doi          = {10.1504/IJSN.2010.032214},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Raad10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RichardAK10,
  author       = {Richard O. Afolabi and
                  Aftab Ahmad and
                  Kiseon Kim},
  title        = {Security assessments of {IEEE} 802.15.4 standard based on {X.805}
                  framework},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {188--197},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032217},
  doi          = {10.1504/IJSN.2010.032217},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RichardAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RodriguesJ10,
  author       = {Mark J. Rodrigues and
                  Kieran James},
  title        = {Perceived barriers to the widespread commercial use of Radio Frequency
                  Identification technology},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {165--172},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032215},
  doi          = {10.1504/IJSN.2010.032215},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RodriguesJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SchraderMPM10,
  author       = {Karl R. Schrader and
                  Barry E. Mullins and
                  Gilbert L. Peterson and
                  Robert F. Mills},
  title        = {An FPGA-based system for tracking digital information transmitted
                  via Peer-to-Peer protocols},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {4},
  pages        = {236--247},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.037662},
  doi          = {10.1504/IJSN.2010.037662},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SchraderMPM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SinghL10,
  author       = {Manmeet Mahinderjit Singh and
                  Xue Li},
  title        = {Trust in RFID-enabled Supply-Chain Management},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {96--105},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032208},
  doi          = {10.1504/IJSN.2010.032208},
  timestamp    = {Fri, 17 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/SinghL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Sun10,
  author       = {L. Sun},
  title        = {Security and privacy on low-cost Radio Frequency Identification systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {128--134},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032211},
  doi          = {10.1504/IJSN.2010.032211},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Sun10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/TsaiHW10,
  author       = {Kuo{-}Yu Tsai and
                  Chien{-}Lung Hsu and
                  Tzong{-}Chen Wu},
  title        = {Mutual anonymity protocol with integrity protection for mobile peer-to-peer
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {45--52},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030722},
  doi          = {10.1504/IJSN.2010.030722},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/TsaiHW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WangS10,
  author       = {Ju Wang and
                  G. L. Smith},
  title        = {A cross-layer authentication design for secure video transportation
                  in wireless sensor network},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {63--76},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030724},
  doi          = {10.1504/IJSN.2010.030724},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WangS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/XuCHM10,
  author       = {Li Xu and
                  Sisheng Chen and
                  Xinyi Huang and
                  Yi Mu},
  title        = {Bloom filter based secure and anonymous {DSR} protocol in wireless
                  ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {35--44},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030721},
  doi          = {10.1504/IJSN.2010.030721},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/XuCHM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Yang10,
  author       = {Ming{-}Hour Yang},
  title        = {Lightweight authentication protocol for mobile {RFID} networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {53--62},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030723},
  doi          = {10.1504/IJSN.2010.030723},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Yang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhangGS10,
  author       = {Xiaowen Zhang and
                  Qinghai Gao and
                  Mohamed K. Saad},
  title        = {Looking at a class of {RFID} APs through {GNY} logic},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {2/3},
  pages        = {135--146},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.032212},
  doi          = {10.1504/IJSN.2010.032212},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhangGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhuangLC10,
  author       = {Zhenyun Zhuang and
                  Ying Li and
                  Zesheng Chen},
  title        = {Enhancing Intrusion Detection System with proximity information},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {4},
  pages        = {207--219},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.037660},
  doi          = {10.1504/IJSN.2010.037660},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhuangLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics