Search dblp for Publications

export results for "toc:db/journals/ijsn/ijsn3.bht:"

 download as .bib file

@article{DBLP:journals/ijsn/AsadpourSM08,
  author       = {Mahdi Asadpour and
                  Behnam Sattarzadeh and
                  Ali Movaghar},
  title        = {Anonymous authentication protocol for {GSM} networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {1},
  pages        = {54--62},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.016202},
  doi          = {10.1504/IJSN.2008.016202},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AsadpourSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BouhoulaTBB08,
  author       = {Adel Bouhoula and
                  Zouheir Trabelsi and
                  Ezedin Barka and
                  Mohammed Anis Benelbahri},
  title        = {Firewall filtering rules analysis for anomalies detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {161--172},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020090},
  doi          = {10.1504/IJSN.2008.020090},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BouhoulaTBB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BurtDRTW08,
  author       = {Andrew Burt and
                  Michael Darschewski and
                  Indrajit Ray and
                  Ramakrishna Thurimella and
                  Hailin Wu},
  title        = {Origins: an approach to trace fast spreading worms to their roots},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {1},
  pages        = {36--46},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.016200},
  doi          = {10.1504/IJSN.2008.016200},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BurtDRTW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChallalGBB08,
  author       = {Yacine Challal and
                  Said Gharout and
                  Abdelmadjid Bouabdallah and
                  Hatem Bettahar},
  title        = {Adaptive clustering for scalable key management in dynamic group communications},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {2},
  pages        = {133--146},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.017226},
  doi          = {10.1504/IJSN.2008.017226},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChallalGBB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/CroninSB08,
  author       = {Eric Cronin and
                  Micah Sherr and
                  Matt Blaze},
  title        = {On the (un)reliability of eavesdropping},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {2},
  pages        = {103--113},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.017223},
  doi          = {10.1504/IJSN.2008.017223},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/CroninSB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HsiehCLCLL08,
  author       = {Cheng{-}Kuan Hsieh and
                  Jyh{-}Cheng Chen and
                  Yi{-}Bing Lin and
                  Kuei{-}Hui Chen and
                  Hsin{-}Yu Liao and
                  Ching{-}Feng Liang},
  title        = {NTP-DownloadT: a conformance test tool for secured mobile download
                  services},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {4},
  pages        = {240--249},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020731},
  doi          = {10.1504/IJSN.2008.020731},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HsiehCLCLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HuRC08,
  author       = {Fei Hu and
                  Amish Rughoonundon and
                  Laura Celentano},
  title        = {Towards a realistic testbed for wireless network reliability and security
                  performance studies},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {1},
  pages        = {63--77},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.016203},
  doi          = {10.1504/IJSN.2008.016203},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HuRC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KandikattuJ08,
  author       = {Ramanarayana Kandikattu and
                  Lillykutty Jacob},
  title        = {Secure hybrid routing with micro/macro-mobility handoff mechanisms
                  for urban wireless mesh networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {4},
  pages        = {258--274},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020733},
  doi          = {10.1504/IJSN.2008.020733},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KandikattuJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KilpatrickGCPS08,
  author       = {Tim Kilpatrick and
                  Jes{\'{u}}s Gonz{\'{a}}lez and
                  Rodrigo Chandia and
                  Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Forensic analysis of {SCADA} systems and networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {2},
  pages        = {95--102},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.017222},
  doi          = {10.1504/IJSN.2008.017222},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KilpatrickGCPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KotzanikolaouVSM08,
  author       = {Panayiotis Kotzanikolaou and
                  Dimitrios D. Vergados and
                  Giannis Stergiou and
                  Emmanouil Magkos},
  title        = {Multilayer key establishment for large-scale sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {1},
  pages        = {1--9},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.016197},
  doi          = {10.1504/IJSN.2008.016197},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/KotzanikolaouVSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiSW08,
  author       = {Feng Li and
                  Avinash Srinivasan and
                  Jie Wu},
  title        = {{PVFS:} {A} Probabilistic Voting-based Filtering Scheme in Wireless
                  Sensor Networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {173--182},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020091},
  doi          = {10.1504/IJSN.2008.020091},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiXH08,
  author       = {Fagen Li and
                  Xiangjun Xin and
                  Yupu Hu},
  title        = {ID-based threshold proxy signcryption scheme from bilinear pairings},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {206--215},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020095},
  doi          = {10.1504/IJSN.2008.020095},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiXH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LinLZHS08,
  author       = {Xiaodong Lin and
                  Xinhua Ling and
                  Haojin Zhu and
                  Pin{-}Han Ho and
                  Xuemin Shen},
  title        = {A novel localised authentication scheme in {IEEE} 802.11 based Wireless
                  Mesh Networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {2},
  pages        = {122--132},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.017225},
  doi          = {10.1504/IJSN.2008.017225},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/LinLZHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MaC08,
  author       = {Xiaoqi Ma and
                  Xiaochun Cheng},
  title        = {Verifying security protocols by knowledge analysis},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {183--192},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020092},
  doi          = {10.1504/IJSN.2008.020092},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/MaC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MaTXD08,
  author       = {Liran Ma and
                  Amin Y. Teymorian and
                  Kai Xing and
                  Ding{-}Zhu Du},
  title        = {An one-way function based framework for pairwise key establishment
                  in sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {4},
  pages        = {217--225},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020729},
  doi          = {10.1504/IJSN.2008.020729},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/MaTXD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/OkolicaPM08,
  author       = {James S. Okolica and
                  Gilbert L. Peterson and
                  Robert F. Mills},
  title        = {Using {PLSI-U} to detect insider threats by datamining e-mail},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {2},
  pages        = {114--121},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.017224},
  doi          = {10.1504/IJSN.2008.017224},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/OkolicaPM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RayP08,
  author       = {Indrajit Ray and
                  Nayot Poolsappasit},
  title        = {Using mobile ad hoc networks to acquire digital evidence from remote
                  autonomous agents},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {2},
  pages        = {80--94},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.017221},
  doi          = {10.1504/IJSN.2008.017221},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RayP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SadowitzLW08,
  author       = {Michael Sadowitz and
                  Shahram Latifi and
                  David J. Walker},
  title        = {An iris and retina multimodal biometric system},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {4},
  pages        = {250--257},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020732},
  doi          = {10.1504/IJSN.2008.020732},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SadowitzLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ScheirerC08,
  author       = {Walter J. Scheirer and
                  Mooi Choo Chuah},
  title        = {Syntax vs. semantics: competing approaches to dynamic network intrusion
                  detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {1},
  pages        = {24--35},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.016199},
  doi          = {10.1504/IJSN.2008.016199},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ScheirerC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SrinivasanLWL08,
  author       = {Avinash Srinivasan and
                  Feng Li and
                  Jie Wu and
                  Minglu Li},
  title        = {Clique-based group key assignment in Wireless Sensor Networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {4},
  pages        = {226--239},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020730},
  doi          = {10.1504/IJSN.2008.020730},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SrinivasanLWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/TripathyN08,
  author       = {Somanath Tripathy and
                  Sukumar Nandi},
  title        = {Secure user-identification and key distribution scheme preserving
                  anonymity},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {201--205},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020094},
  doi          = {10.1504/IJSN.2008.020094},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/TripathyN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/UphoffW08,
  author       = {Benjamin Uphoff and
                  Johnny S. Wong},
  title        = {An agent-based framework for intrusion detection alert verification
                  and event correlation},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {193--200},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020093},
  doi          = {10.1504/IJSN.2008.020093},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/UphoffW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WangKBG08,
  author       = {Weichao Wang and
                  Jiejun Kong and
                  Bharat K. Bhargava and
                  Mario Gerla},
  title        = {Visualisation of wormholes in underwater sensor networks: a distributed
                  approach},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {1},
  pages        = {10--23},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.016198},
  doi          = {10.1504/IJSN.2008.016198},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WangKBG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/XuAR08,
  author       = {Haiping Xu and
                  Mihir M. Ayachit and
                  Abhinay Reddyreddy},
  title        = {Formal modelling and analysis of {XML} firewall for service-oriented
                  systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {3},
  pages        = {147--160},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.020089},
  doi          = {10.1504/IJSN.2008.020089},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/XuAR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZouK08,
  author       = {Xukai Zou and
                  Yogesh Karandikar},
  title        = {A novel Conference Key Management solution for Secure Dynamic Conferencing},
  journal      = {Int. J. Secur. Networks},
  volume       = {3},
  number       = {1},
  pages        = {47--53},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJSN.2008.016201},
  doi          = {10.1504/IJSN.2008.016201},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZouK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}