default search action
Search dblp for Publications
export results for "toc:db/journals/ijsn/ijsn3.bht:"
@article{DBLP:journals/ijsn/AsadpourSM08, author = {Mahdi Asadpour and Behnam Sattarzadeh and Ali Movaghar}, title = {Anonymous authentication protocol for {GSM} networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {54--62}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016202}, doi = {10.1504/IJSN.2008.016202}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AsadpourSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BouhoulaTBB08, author = {Adel Bouhoula and Zouheir Trabelsi and Ezedin Barka and Mohammed Anis Benelbahri}, title = {Firewall filtering rules analysis for anomalies detection}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {3}, pages = {161--172}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020090}, doi = {10.1504/IJSN.2008.020090}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BouhoulaTBB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BurtDRTW08, author = {Andrew Burt and Michael Darschewski and Indrajit Ray and Ramakrishna Thurimella and Hailin Wu}, title = {Origins: an approach to trace fast spreading worms to their roots}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {36--46}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016200}, doi = {10.1504/IJSN.2008.016200}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BurtDRTW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChallalGBB08, author = {Yacine Challal and Said Gharout and Abdelmadjid Bouabdallah and Hatem Bettahar}, title = {Adaptive clustering for scalable key management in dynamic group communications}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {2}, pages = {133--146}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.017226}, doi = {10.1504/IJSN.2008.017226}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChallalGBB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/CroninSB08, author = {Eric Cronin and Micah Sherr and Matt Blaze}, title = {On the (un)reliability of eavesdropping}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {2}, pages = {103--113}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.017223}, doi = {10.1504/IJSN.2008.017223}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/CroninSB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HsiehCLCLL08, author = {Cheng{-}Kuan Hsieh and Jyh{-}Cheng Chen and Yi{-}Bing Lin and Kuei{-}Hui Chen and Hsin{-}Yu Liao and Ching{-}Feng Liang}, title = {NTP-DownloadT: a conformance test tool for secured mobile download services}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {4}, pages = {240--249}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020731}, doi = {10.1504/IJSN.2008.020731}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HsiehCLCLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HuRC08, author = {Fei Hu and Amish Rughoonundon and Laura Celentano}, title = {Towards a realistic testbed for wireless network reliability and security performance studies}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {63--77}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016203}, doi = {10.1504/IJSN.2008.016203}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HuRC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KandikattuJ08, author = {Ramanarayana Kandikattu and Lillykutty Jacob}, title = {Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {4}, pages = {258--274}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020733}, doi = {10.1504/IJSN.2008.020733}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KandikattuJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KilpatrickGCPS08, author = {Tim Kilpatrick and Jes{\'{u}}s Gonz{\'{a}}lez and Rodrigo Chandia and Mauricio Papa and Sujeet Shenoi}, title = {Forensic analysis of {SCADA} systems and networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {2}, pages = {95--102}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.017222}, doi = {10.1504/IJSN.2008.017222}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KilpatrickGCPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KotzanikolaouVSM08, author = {Panayiotis Kotzanikolaou and Dimitrios D. Vergados and Giannis Stergiou and Emmanouil Magkos}, title = {Multilayer key establishment for large-scale sensor networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {1--9}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016197}, doi = {10.1504/IJSN.2008.016197}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/KotzanikolaouVSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiSW08, author = {Feng Li and Avinash Srinivasan and Jie Wu}, title = {{PVFS:} {A} Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {3}, pages = {173--182}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020091}, doi = {10.1504/IJSN.2008.020091}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiXH08, author = {Fagen Li and Xiangjun Xin and Yupu Hu}, title = {ID-based threshold proxy signcryption scheme from bilinear pairings}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {3}, pages = {206--215}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020095}, doi = {10.1504/IJSN.2008.020095}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiXH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LinLZHS08, author = {Xiaodong Lin and Xinhua Ling and Haojin Zhu and Pin{-}Han Ho and Xuemin Shen}, title = {A novel localised authentication scheme in {IEEE} 802.11 based Wireless Mesh Networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {2}, pages = {122--132}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.017225}, doi = {10.1504/IJSN.2008.017225}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/LinLZHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MaC08, author = {Xiaoqi Ma and Xiaochun Cheng}, title = {Verifying security protocols by knowledge analysis}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {3}, pages = {183--192}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020092}, doi = {10.1504/IJSN.2008.020092}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/MaC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MaTXD08, author = {Liran Ma and Amin Y. Teymorian and Kai Xing and Ding{-}Zhu Du}, title = {An one-way function based framework for pairwise key establishment in sensor networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {4}, pages = {217--225}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020729}, doi = {10.1504/IJSN.2008.020729}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/MaTXD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/OkolicaPM08, author = {James S. Okolica and Gilbert L. Peterson and Robert F. Mills}, title = {Using {PLSI-U} to detect insider threats by datamining e-mail}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {2}, pages = {114--121}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.017224}, doi = {10.1504/IJSN.2008.017224}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/OkolicaPM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RayP08, author = {Indrajit Ray and Nayot Poolsappasit}, title = {Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {2}, pages = {80--94}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.017221}, doi = {10.1504/IJSN.2008.017221}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RayP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SadowitzLW08, author = {Michael Sadowitz and Shahram Latifi and David J. Walker}, title = {An iris and retina multimodal biometric system}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {4}, pages = {250--257}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020732}, doi = {10.1504/IJSN.2008.020732}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SadowitzLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ScheirerC08, author = {Walter J. Scheirer and Mooi Choo Chuah}, title = {Syntax vs. semantics: competing approaches to dynamic network intrusion detection}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {24--35}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016199}, doi = {10.1504/IJSN.2008.016199}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ScheirerC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SrinivasanLWL08, author = {Avinash Srinivasan and Feng Li and Jie Wu and Minglu Li}, title = {Clique-based group key assignment in Wireless Sensor Networks}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {4}, pages = {226--239}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020730}, doi = {10.1504/IJSN.2008.020730}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SrinivasanLWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/TripathyN08, author = {Somanath Tripathy and Sukumar Nandi}, title = {Secure user-identification and key distribution scheme preserving anonymity}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {3}, pages = {201--205}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020094}, doi = {10.1504/IJSN.2008.020094}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/TripathyN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/UphoffW08, author = {Benjamin Uphoff and Johnny S. Wong}, title = {An agent-based framework for intrusion detection alert verification and event correlation}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {3}, pages = {193--200}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020093}, doi = {10.1504/IJSN.2008.020093}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/UphoffW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WangKBG08, author = {Weichao Wang and Jiejun Kong and Bharat K. Bhargava and Mario Gerla}, title = {Visualisation of wormholes in underwater sensor networks: a distributed approach}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {10--23}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016198}, doi = {10.1504/IJSN.2008.016198}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WangKBG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/XuAR08, author = {Haiping Xu and Mihir M. Ayachit and Abhinay Reddyreddy}, title = {Formal modelling and analysis of {XML} firewall for service-oriented systems}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {3}, pages = {147--160}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.020089}, doi = {10.1504/IJSN.2008.020089}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/XuAR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZouK08, author = {Xukai Zou and Yogesh Karandikar}, title = {A novel Conference Key Management solution for Secure Dynamic Conferencing}, journal = {Int. J. Secur. Networks}, volume = {3}, number = {1}, pages = {47--53}, year = {2008}, url = {https://doi.org/10.1504/IJSN.2008.016201}, doi = {10.1504/IJSN.2008.016201}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZouK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.