default search action
Security and Communication Networks, Volume 2
Volume 2, Number 1, January / February 2009
- Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J. Han Vinck:
Mathematical model for constructing passwords from biometrical data. 1-9 - Kumar Simkhada, Tarik Taleb, Yuji Waizumi, Abbas Jamalipour, Yoshiaki Nemoto:
Combating against internet worms in large-scale networks: an autonomic signature-based solution. 11-28 - Debra L. Cook, Vijay K. Gurbani, Michael Daniluk:
Phishwish: a simple and stateless phishing filter. 29-43 - Xu Su, Rajendra V. Boppana:
Crosscheck mechanism to identify malicious nodes in ad hoc networks. 45-54 - Adrian N. Phillips, Barry E. Mullins, Richard A. Raines, Rusty O. Baldwin:
A secure group communication architecture for autonomous unmanned aerial vehicles. 55-69 - Fei Hu, Kyle Wilhelm, Michael Schab, Marcin Lukowiak, Stanislaw P. Radziszowski, Yang Xiao:
NTRU-based sensor network security: a low-power hardware implementation perspective. 71-81 - Ram Dantu, Prakash Kolan, João W. Cangussu:
Network risk management using attacker profiling. 83-96
Volume 2, Number 2, March / April 2009
- Mohammad S. Obaidat, Petros Nicopolitidis, Jung-Shian Li:
Security in wireless sensor networks. 101-103
- Sudip Misra, Kiran Isaac Abraham, Mohammad S. Obaidat, P. Venkata Krishna:
LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks. 105-115
- Ivan Martinovic, Nicos Gollan, Luc Cappellaro, Jens B. Schmitt:
Chaotic communication improves authentication: protecting WSNs against injection attacks. 117-132
- Bo-Chao Cheng, Huan Chen, Guo-Tan Liao:
FBT: an efficient traceback scheme in hierarchical wireless sensor network. 133-144
- Aristides Mpitziopoulos, Damianos Gavalas:
An effective defensive node against jamming attacks in sensor networks. 145-163
- Marcos A. Simplício Jr., Pedro d'Aquino F. F. S. Barbuda, Paulo S. L. M. Barreto, Tereza Cristina M. B. Carvalho, Cíntia B. Margi:
The MARVIN message authentication code and the LETTERSOUP authenticated encryption scheme. 165-180 - Roberto Di Pietro, Pietro Michiardi, Refik Molva:
Confidentiality and integrity for data aggregation in WSN using peer monitoring. 181-194
- Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini:
Privacy-preserving robust data aggregation in wireless sensor networks. 195-213
- Sanjay Kumar Dhurandher, Sudip Misra, Mohammad S. Obaidat, Nidhi Gupta:
An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks. 215-224
Volume 2, Number 3, May / June 2009
- Yingbin Liang, H. Vincent Poor, Shlomo Shamai:
Physical layer security in broadcast networks. 227-238 - Avinash Srinivasan, Jie Wu:
Secure and reliable broadcasting in wireless sensor networks using multi-parent trees. 239-253 - Jian Ren:
An identity-based single-sign-on scheme for computer networks. 255-258 - Yen-Chieh Ouyang, Ching-Tsung Hsueh, Hung-Wei Chen:
Secure authentication policy with evidential signature scheme for WLAN. 259-270 - André König, Matthias Hollick, Tronje Krop, Ralf Steinmetz:
GeoSec: quarantine zones for mobile ad hoc networks. 271-288 - Vasilis Chatzigiannakis, Symeon Papavassiliou, Georgios Androulidakis:
Improving network anomaly detection effectiveness via an integrated multi-metric-multi-link (M3L) PCA-based approach. 289-304
Volume 2, Number 4, July / August 2009
- Romano Fantacci, Simone Menci, Luigia Micciullo, Laura Pierucci:
A secure radio communication system based on an efficient speech watermarking approach. 305-314 - Kaleb Brasee, S. Kami Makki, Sherali Zeadally:
A secure two-factor authentication scheme for single sign-on services. 315-323 - Qing Li, Meiyuan Zhao, Jesse Walker, Yih-Chun Hu, Adrian Perrig, Wade Trappe:
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. 325-340 - Benamar Kadri, Mohammed Feham, Abdallah M'hamed:
Securing reactive routing protocols in MANETs using PKI (PKI-DSR). 341-350 - Abderrezak Rachedi, Abderrahim Benslimane:
Toward a cross-layer monitoring process for mobile ad hoc networks. 351-368
Volume 2, Number 5, September / October 2009
- Adel Omar Dahmane, Mustapha Razzak, Sghaier Guizani:
Guest Editorial: Special Issue on: WiMAX security and applications. 371-372
- Bharat K. Bhargava, Yu Zhang, Nwokedi C. Idika, Leszek Lilien, Mehdi Azarmi:
Collaborative attacks in WiMAX networks. 373-391 - Jeremy Brown, Xiaojiang Du, Mohsen Guizani:
Efficient rekeying algorithms for WiMAX networks. 392-400 - Wassim El-Hajj, Hazem M. Hajj, Ezedin Barka, Zaher Dawy, Omar El Hmaissy, Dima Ghaddar, Youssef Aitour:
Optimal WiMax planning with security considerations. 401-412 - Bongkyoung Kwon, Raheem A. Beyah, John A. Copeland:
Key challenges in securing WiMAX mesh networks. 413-426
- Hui Chen, Yang Xiao, Xiaoyan Hong, Fei Hu, Jiang (Linda) Xie:
A survey of anonymity in wireless communication systems. 427-444 - Huachun Zhou, Hongke Zhang, Yajuan Qin:
An authentication method for proxy mobile IPv6 and performance analysis. 445-454
Volume 2, Number 6, November / December 2009
- Bazara I. A. Barry, H. Anthony Chan:
Syntax, and semantics-based signature database for hybrid intrusion detection systems. 457-475 - Chao Zou, Chunxiao Chigan:
An anonymous on-demand source routing in MANETs. 476-491 - Reed Newman, Raheem A. Beyah:
On the performance of using Covert Timing Channels for node authentication. 492-506 - Wassim Itani, Ayman I. Kayssi, Ali Chehab:
Smart encryption channels for securing virtual machine-based networked applications. 507-518 - Di Jin, Pramode K. Verma, Stamatios V. Kartalopoulos:
Fast convergent key distribution algorithms using a dual quantum channel. 519-530 - Yanjiang Yang, Robert H. Deng, Feng Bao:
Privacy-preserving rental services using one-show anonymous credentials. 531-545 - Yuhua Chen, Pramode K. Verma, Subhash C. Kak:
Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks. 546-554 - Abdelrahman Desoky, Mohamed F. Younis:
Chestega: chess steganography methodology. 555-566 - Ling Dong, Kefei Chen, Xuejia Lai, Mi Wen:
When is a key establishment protocol correct? 567-579 - Lei Tang, Xiaoyan Hong, Susan V. Vrbsky:
Using camouflaging mobility to protect privacy in mobile ad hoc networks. 580-594 - Panayiotis Kotzanikolaou, Emmanouil Magkos, Dimitrios D. Vergados, Michalis Stefanidakis:
Secure and practical key establishment for distributed sensor networks. 595-610 - Christian Callegari, Stefano Giordano, Michele Pagano:
New statistical approaches for anomaly detection. 611-634 - Juan C. Pelaez, Eduardo B. Fernández, María M. Larrondo-Petrie:
Misuse patterns in VoIP. 635-653 - Ke Meng, Yang Xiao, Susan V. Vrbsky:
Building a wireless capturing tool for WiFi. 654-668 - Wei Wang, Hong Man, Yu Liu:
A framework for intrusion detection systems by social network analysis methods in ad hoc networks. 669-685 - Stamatios V. Kartalopoulos:
K08: a generalized BB84/B92 protocol in quantum cryptography. 686-693 - B. Sathish Babu, Pallapa Venkataram:
Random security scheme selection for mobile transactions. 694-708
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.