Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijsn/ijsn2.bht:"
@article{DBLP:journals/ijsn/AbdallaBCMP07, author = {Michel Abdalla and Emmanuel Bresson and Olivier Chevassut and Bodo M{\"{o}}ller and David Pointcheval}, title = {Strong password-based authentication in {TLS} using the three-party group Diffie?Hellman protocol}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {284--296}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013181}, doi = {10.1504/IJSN.2007.013181}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AbdallaBCMP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ArtanC07, author = {N. Sertac Artan and H. Jonathan Chao}, title = {Design and analysis of a multipacket signature detection system}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {122--136}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012830}, doi = {10.1504/IJSN.2007.012830}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ArtanC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/BhaskarHL07, author = {Raghav Bhaskar and Javier Herranz and Fabien Laguillaumie}, title = {Aggregate designated verifier signatures and application to secure routing}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {192--201}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013173}, doi = {10.1504/IJSN.2007.013173}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/BhaskarHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenJ07, author = {Zesheng Chen and Chuanyi Ji}, title = {Optimal worm-scanning method using vulnerable-host distributions}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {71--80}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012826}, doi = {10.1504/IJSN.2007.012826}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChengC07, author = {Zhaohui Cheng and Liqun Chen}, title = {On security proof of McCullagh?Barreto's key agreement protocol and its variants}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {251--259}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013178}, doi = {10.1504/IJSN.2007.013178}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChengC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ErdoganC07, author = {Ozgun Erdogan and Pei Cao}, title = {Hash-AV: fast virus signature scanning by cache-resident filters}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {50--59}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012824}, doi = {10.1504/IJSN.2007.012824}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ErdoganC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/FinniginMRP07, author = {Kevin M. Finnigin and Barry E. Mullins and Richard A. Raines and Henry B. Potoczny}, title = {Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {260--271}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013179}, doi = {10.1504/IJSN.2007.013179}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/FinniginMRP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/GuLCZ07, author = {Qijun Gu and Peng Liu and Chao{-}Hsien Chu and Sencun Zhu}, title = {Defence against packet injection in ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {154--169}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012832}, doi = {10.1504/IJSN.2007.012832}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/GuLCZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HoeperG07, author = {Katrin Hoeper and Guang Gong}, title = {Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {239--250}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013177}, doi = {10.1504/IJSN.2007.013177}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HoeperG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HsuZH07, author = {Hung{-}Yuan Hsu and Sencun Zhu and Ali R. Hurson}, title = {{LIP:} a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {202--215}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013174}, doi = {10.1504/IJSN.2007.013174}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HsuZH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Huang07, author = {Dijiang Huang}, title = {Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {272--283}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013180}, doi = {10.1504/IJSN.2007.013180}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Huang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KorkmazGSD07, author = {Turgay Korkmaz and Chao Gong and Kamil Sara{\c{c}} and Sandra G. Dykes}, title = {Single packet {IP} traceback in AS-level partial deployment scenario}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {95--108}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012828}, doi = {10.1504/IJSN.2007.012828}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/KorkmazGSD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiLC07, author = {Ruidong Li and Jie Li and Hsiao{-}Hwa Chen}, title = {{DKMS:} distributed hierarchical access control for multimedia networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {3--10}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012821}, doi = {10.1504/IJSN.2007.012821}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/LiLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LingZ07, author = {Hui Ling and Taieb Znati}, title = {End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {109--121}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012829}, doi = {10.1504/IJSN.2007.012829}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LingZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Malaney07, author = {Robert A. Malaney}, title = {Securing Wi-Fi networks with position verification: extended version}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {27--36}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012822}, doi = {10.1504/IJSN.2007.012822}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Malaney07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MichailPTKG07, author = {Harris E. Michail and George A. Panagiotakopoulos and Vasilis N. Thanasoulis and Athanasios Kakarountas and Costas E. Goutis}, title = {Server side hashing core exceeding 3 Gbps of throughput}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {228--238}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013176}, doi = {10.1504/IJSN.2007.013176}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MichailPTKG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/OliveiraWLD07, author = {Leonardo B. Oliveira and Hao Chi Wong and Antonio Alfredo Ferreira Loureiro and Ricardo Dahab}, title = {On the design of secure protocols for hierarchical sensor networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {216--227}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013175}, doi = {10.1504/IJSN.2007.013175}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/OliveiraWLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/PanCS07, author = {Jianping Pan and Lin Cai and Xuemin Shen}, title = {Vulnerabilities in distance-indexed {IP} traceback schemes}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {81--94}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012827}, doi = {10.1504/IJSN.2007.012827}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/PanCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RabinovichS07, author = {Paul Rabinovich and Robert Simon}, title = {Secure message delivery in publish/subscribe networks using overlay multicast}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {60--70}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012825}, doi = {10.1504/IJSN.2007.012825}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/RabinovichS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SakarindrA07, author = {Pitipatana Sakarindr and Nirwan Ansari}, title = {Adaptive trust-based anonymous network}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {11--26}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012820}, doi = {10.1504/IJSN.2007.012820}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SakarindrA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/SunS07, author = {Fangting Sun and Mark A. Shayman}, title = {On pairwise connectivity of wireless multihop networks}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {37--49}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012823}, doi = {10.1504/IJSN.2007.012823}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/SunS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/TartaryW07, author = {Christophe Tartary and Huaxiong Wang}, title = {Efficient multicast stream authentication for the fully adversarial network model}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {175--191}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013172}, doi = {10.1504/IJSN.2007.013172}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/TartaryW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhuFBZ07, author = {Ye Zhu and Xinwen Fu and Riccardo Bettati and Wei Zhao}, title = {Analysis of flow-correlation attacks in anonymity network}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {1/2}, pages = {137--153}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.012831}, doi = {10.1504/IJSN.2007.012831}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhuFBZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.