


default search action
Security and Communication Networks, Volume 2
Volume 2, Number 1, January / February 2009
- Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J. Han Vinck:

Mathematical model for constructing passwords from biometrical data. 1-9 - Kumar Simkhada, Tarik Taleb, Yuji Waizumi, Abbas Jamalipour

, Yoshiaki Nemoto:
Combating against internet worms in large-scale networks: an autonomic signature-based solution. 11-28 - Debra L. Cook, Vijay K. Gurbani, Michael Daniluk:

Phishwish: a simple and stateless phishing filter. 29-43 - Xu Su, Rajendra V. Boppana:

Crosscheck mechanism to identify malicious nodes in ad hoc networks. 45-54 - Adrian N. Phillips, Barry E. Mullins, Richard A. Raines, Rusty O. Baldwin:

A secure group communication architecture for autonomous unmanned aerial vehicles. 55-69 - Fei Hu, Kyle Wilhelm, Michael Schab, Marcin Lukowiak, Stanislaw P. Radziszowski, Yang Xiao

:
NTRU-based sensor network security: a low-power hardware implementation perspective. 71-81 - Ram Dantu, Prakash Kolan, João W. Cangussu:

Network risk management using attacker profiling. 83-96
Volume 2, Number 2, March / April 2009
- Mohammad S. Obaidat

, Petros Nicopolitidis, Jung-Shian Li:
Security in wireless sensor networks. 101-103
- Sudip Misra, Kiran Isaac Abraham, Mohammad S. Obaidat

, P. Venkata Krishna
:
LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks. 105-115
- Ivan Martinovic, Nicos Gollan, Luc Cappellaro, Jens B. Schmitt:

Chaotic communication improves authentication: protecting WSNs against injection attacks. 117-132
- Bo-Chao Cheng, Huan Chen, Guo-Tan Liao:

FBT: an efficient traceback scheme in hierarchical wireless sensor network. 133-144
- Aristides Mpitziopoulos, Damianos Gavalas

:
An effective defensive node against jamming attacks in sensor networks. 145-163
- Marcos A. Simplício Jr.

, Pedro d'Aquino F. F. S. Barbuda, Paulo S. L. M. Barreto, Tereza Cristina M. B. Carvalho
, Cíntia B. Margi
:
The MARVIN message authentication code and the LETTERSOUP authenticated encryption scheme. 165-180 - Roberto Di Pietro

, Pietro Michiardi, Refik Molva
:
Confidentiality and integrity for data aggregation in WSN using peer monitoring. 181-194
- Mauro Conti

, Lei Zhang, Sankardas Roy, Roberto Di Pietro
, Sushil Jajodia, Luigi V. Mancini
:
Privacy-preserving robust data aggregation in wireless sensor networks. 195-213
- Sanjay Kumar Dhurandher, Sudip Misra, Mohammad S. Obaidat

, Nidhi Gupta:
An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks. 215-224
Volume 2, Number 3, May / June 2009
- Yingbin Liang, H. Vincent Poor

, Shlomo Shamai
:
Physical layer security in broadcast networks. 227-238 - Avinash Srinivasan, Jie Wu:

Secure and reliable broadcasting in wireless sensor networks using multi-parent trees. 239-253 - Jian Ren:

An identity-based single-sign-on scheme for computer networks. 255-258 - Yen-Chieh Ouyang

, Ching-Tsung Hsueh, Hung-Wei Chen:
Secure authentication policy with evidential signature scheme for WLAN. 259-270 - André König, Matthias Hollick

, Tronje Krop, Ralf Steinmetz
:
GeoSec: quarantine zones for mobile ad hoc networks. 271-288 - Vasilis Chatzigiannakis, Symeon Papavassiliou, Georgios Androulidakis:

Improving network anomaly detection effectiveness via an integrated multi-metric-multi-link (M3L) PCA-based approach. 289-304
Volume 2, Number 4, July / August 2009
- Romano Fantacci

, Simone Menci, Luigia Micciullo, Laura Pierucci:
A secure radio communication system based on an efficient speech watermarking approach. 305-314 - Kaleb Brasee, S. Kami Makki, Sherali Zeadally:

A secure two-factor authentication scheme for single sign-on services. 315-323 - Qing Li, Meiyuan Zhao, Jesse Walker, Yih-Chun Hu, Adrian Perrig, Wade Trappe:

SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. 325-340 - Benamar Kadri, Mohammed Feham, Abdallah M'hamed:

Securing reactive routing protocols in MANETs using PKI (PKI-DSR). 341-350 - Abderrezak Rachedi

, Abderrahim Benslimane
:
Toward a cross-layer monitoring process for mobile ad hoc networks. 351-368
Volume 2, Number 5, September / October 2009
- Adel Omar Dahmane, Mustapha Razzak, Sghaier Guizani

:
Guest Editorial: Special Issue on: WiMAX security and applications. 371-372
- Bharat K. Bhargava, Yu Zhang, Nwokedi C. Idika, Leszek Lilien

, Mehdi Azarmi:
Collaborative attacks in WiMAX networks. 373-391 - Jeremy Brown, Xiaojiang Du, Mohsen Guizani:

Efficient rekeying algorithms for WiMAX networks. 392-400 - Wassim El-Hajj

, Hazem M. Hajj, Ezedin Barka, Zaher Dawy, Omar El Hmaissy, Dima Ghaddar, Youssef Aitour:
Optimal WiMax planning with security considerations. 401-412 - Bongkyoung Kwon, Raheem A. Beyah

, John A. Copeland:
Key challenges in securing WiMAX mesh networks. 413-426
- Hui Chen

, Yang Xiao
, Xiaoyan Hong, Fei Hu, Jiang (Linda) Xie:
A survey of anonymity in wireless communication systems. 427-444 - Huachun Zhou, Hongke Zhang, Yajuan Qin:

An authentication method for proxy mobile IPv6 and performance analysis. 445-454
Volume 2, Number 6, November / December 2009
- Bazara I. A. Barry, H. Anthony Chan:

Syntax, and semantics-based signature database for hybrid intrusion detection systems. 457-475 - Chao Zou, Chunxiao Chigan:

An anonymous on-demand source routing in MANETs. 476-491 - Reed Newman, Raheem A. Beyah

:
On the performance of using Covert Timing Channels for node authentication. 492-506 - Wassim Itani, Ayman I. Kayssi, Ali Chehab

:
Smart encryption channels for securing virtual machine-based networked applications. 507-518 - Di Jin, Pramode K. Verma, Stamatios V. Kartalopoulos:

Fast convergent key distribution algorithms using a dual quantum channel. 519-530 - Yanjiang Yang, Robert H. Deng

, Feng Bao:
Privacy-preserving rental services using one-show anonymous credentials. 531-545 - Yuhua Chen, Pramode K. Verma, Subhash C. Kak:

Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks. 546-554 - Abdelrahman Desoky, Mohamed F. Younis

:
Chestega: chess steganography methodology. 555-566 - Ling Dong, Kefei Chen, Xuejia Lai, Mi Wen:

When is a key establishment protocol correct? 567-579 - Lei Tang, Xiaoyan Hong, Susan V. Vrbsky:

Using camouflaging mobility to protect privacy in mobile ad hoc networks. 580-594 - Panayiotis Kotzanikolaou

, Emmanouil Magkos, Dimitrios D. Vergados
, Michalis Stefanidakis:
Secure and practical key establishment for distributed sensor networks. 595-610 - Christian Callegari

, Stefano Giordano, Michele Pagano
:
New statistical approaches for anomaly detection. 611-634 - Juan C. Pelaez, Eduardo B. Fernández

, María M. Larrondo-Petrie
:
Misuse patterns in VoIP. 635-653 - Ke Meng, Yang Xiao

, Susan V. Vrbsky:
Building a wireless capturing tool for WiFi. 654-668 - Wei Wang, Hong Man, Yu Liu:

A framework for intrusion detection systems by social network analysis methods in ad hoc networks. 669-685 - Stamatios V. Kartalopoulos:

K08: a generalized BB84/B92 protocol in quantum cryptography. 686-693 - B. Sathish Babu

, Pallapa Venkataram:
Random security scheme selection for mobile transactions. 694-708

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














