Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijsn/ijsn5.bht:"
@article{DBLP:journals/ijsn/AbbesBR10, author = {Tarek Abbes and Adel Bouhoula and Micha{\"{e}}l Rusinowitch}, title = {Efficient decision tree for protocol analysis in intrusion detection}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {4}, pages = {220--235}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.037661}, doi = {10.1504/IJSN.2010.037661}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AbbesBR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AzevedoF10, author = {Susana Garrido Azevedo and Jo{\~{a}}o J. Ferreira}, title = {Radio frequency identification: a case study of healthcare organisations}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {147--155}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032213}, doi = {10.1504/IJSN.2010.032213}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/AzevedoF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenCW10, author = {Zesheng Chen and Chao Chen and Qian Wang}, title = {On the scalability of Delay-Tolerant Botnets}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {4}, pages = {248--258}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.037664}, doi = {10.1504/IJSN.2010.037664}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenCW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DaltonEMR10, author = {George C. Dalton II and Kenneth S. Edge and Robert F. Mills and Richard A. Raines}, title = {Analysing security risks in computer and Radio Frequency Identification {(RFID)} networks using attack and protection trees}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {87--95}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032207}, doi = {10.1504/IJSN.2010.032207}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/DaltonEMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DongHRW10, author = {Yuhong Dong and Sam Hsu and Saeed Rajput and Bing Wu}, title = {Experimental analysis of application-level intrusion detection algorithms}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {198--205}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032218}, doi = {10.1504/IJSN.2010.032218}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/DongHRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GuoMZL10, author = {Hua Guo and Yi Mu and Xiyong Zhang and Zhoujun Li}, title = {Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {173--187}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032216}, doi = {10.1504/IJSN.2010.032216}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GuoMZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GuoP10, author = {Yinghua Guo and Sylvie Perreau}, title = {Detect DDoS flooding attacks in mobile ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {4}, pages = {259--269}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.037666}, doi = {10.1504/IJSN.2010.037666}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GuoP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HsiaoH10, author = {Yu{-}Kai Hsiao and Ren{-}Junn Hwang}, title = {An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {26--34}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030720}, doi = {10.1504/IJSN.2010.030720}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HsiaoH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HuangS10, author = {Shih{-}I Huang and Shiuhpyng Shieh}, title = {Authentication and secret search mechanisms for RFID-aware wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {15--25}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030719}, doi = {10.1504/IJSN.2010.030719}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HuangS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HutterPF10, author = {Michael Hutter and Thomas Plos and Martin Feldhofer}, title = {On the security of {RFID} devices against implementation attacks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {106--118}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032209}, doi = {10.1504/IJSN.2010.032209}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HutterPF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ImasakiZJ10, author = {Yasuhiro Imasaki and Yongbing Zhang and Yusheng Ji}, title = {Secure and efficient data transmission in {RFID} sensor networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {119--127}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032210}, doi = {10.1504/IJSN.2010.032210}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ImasakiZJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LengLMM10, author = {Xuefei Leng and Yuanhung Lien and Keith Mayes and Konstantinos Markantonakis}, title = {An {RFID} grouping proof protocol exploiting anti-collision algorithm for subgroup dividing}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {79--86}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032206}, doi = {10.1504/IJSN.2010.032206}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LengLMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MalligaT10, author = {S. Malliga and A. Tamilarasi}, title = {A backpressure technique for filtering spoofed traffic at upstream routers}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {3--14}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030718}, doi = {10.1504/IJSN.2010.030718}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MalligaT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Raad10, author = {Muhammad Wassim Raad}, title = {A ubiquitous mobile telemedicine system for the elderly using {RFID}}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {156--164}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032214}, doi = {10.1504/IJSN.2010.032214}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Raad10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RichardAK10, author = {Richard O. Afolabi and Aftab Ahmad and Kiseon Kim}, title = {Security assessments of {IEEE} 802.15.4 standard based on {X.805} framework}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {188--197}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032217}, doi = {10.1504/IJSN.2010.032217}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RichardAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RodriguesJ10, author = {Mark J. Rodrigues and Kieran James}, title = {Perceived barriers to the widespread commercial use of Radio Frequency Identification technology}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {165--172}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032215}, doi = {10.1504/IJSN.2010.032215}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RodriguesJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SchraderMPM10, author = {Karl R. Schrader and Barry E. Mullins and Gilbert L. Peterson and Robert F. Mills}, title = {An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {4}, pages = {236--247}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.037662}, doi = {10.1504/IJSN.2010.037662}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SchraderMPM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SinghL10, author = {Manmeet Mahinderjit Singh and Xue Li}, title = {Trust in RFID-enabled Supply-Chain Management}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {96--105}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032208}, doi = {10.1504/IJSN.2010.032208}, timestamp = {Fri, 17 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/SinghL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Sun10, author = {L. Sun}, title = {Security and privacy on low-cost Radio Frequency Identification systems}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {128--134}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032211}, doi = {10.1504/IJSN.2010.032211}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Sun10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/TsaiHW10, author = {Kuo{-}Yu Tsai and Chien{-}Lung Hsu and Tzong{-}Chen Wu}, title = {Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {45--52}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030722}, doi = {10.1504/IJSN.2010.030722}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/TsaiHW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WangS10, author = {Ju Wang and G. L. Smith}, title = {A cross-layer authentication design for secure video transportation in wireless sensor network}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {63--76}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030724}, doi = {10.1504/IJSN.2010.030724}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WangS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/XuCHM10, author = {Li Xu and Sisheng Chen and Xinyi Huang and Yi Mu}, title = {Bloom filter based secure and anonymous {DSR} protocol in wireless ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {35--44}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030721}, doi = {10.1504/IJSN.2010.030721}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/XuCHM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Yang10, author = {Ming{-}Hour Yang}, title = {Lightweight authentication protocol for mobile {RFID} networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {53--62}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030723}, doi = {10.1504/IJSN.2010.030723}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Yang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhangGS10, author = {Xiaowen Zhang and Qinghai Gao and Mohamed K. Saad}, title = {Looking at a class of {RFID} APs through {GNY} logic}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {2/3}, pages = {135--146}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.032212}, doi = {10.1504/IJSN.2010.032212}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhangGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhuangLC10, author = {Zhenyun Zhuang and Ying Li and Zesheng Chen}, title = {Enhancing Intrusion Detection System with proximity information}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {4}, pages = {207--219}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.037660}, doi = {10.1504/IJSN.2010.037660}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhuangLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.