Search dblp for Publications

export results for "toc:db/journals/ijsn/ijsn2.bht:"

 download as .bib file

@article{DBLP:journals/ijsn/AbdallaBCMP07,
  author       = {Michel Abdalla and
                  Emmanuel Bresson and
                  Olivier Chevassut and
                  Bodo M{\"{o}}ller and
                  David Pointcheval},
  title        = {Strong password-based authentication in {TLS} using the three-party
                  group Diffie?Hellman protocol},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {284--296},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013181},
  doi          = {10.1504/IJSN.2007.013181},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AbdallaBCMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ArtanC07,
  author       = {N. Sertac Artan and
                  H. Jonathan Chao},
  title        = {Design and analysis of a multipacket signature detection system},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {122--136},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012830},
  doi          = {10.1504/IJSN.2007.012830},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ArtanC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/BhaskarHL07,
  author       = {Raghav Bhaskar and
                  Javier Herranz and
                  Fabien Laguillaumie},
  title        = {Aggregate designated verifier signatures and application to secure
                  routing},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {192--201},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013173},
  doi          = {10.1504/IJSN.2007.013173},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/BhaskarHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenJ07,
  author       = {Zesheng Chen and
                  Chuanyi Ji},
  title        = {Optimal worm-scanning method using vulnerable-host distributions},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {71--80},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012826},
  doi          = {10.1504/IJSN.2007.012826},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChengC07,
  author       = {Zhaohui Cheng and
                  Liqun Chen},
  title        = {On security proof of McCullagh?Barreto's key agreement protocol and
                  its variants},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {251--259},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013178},
  doi          = {10.1504/IJSN.2007.013178},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChengC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ErdoganC07,
  author       = {Ozgun Erdogan and
                  Pei Cao},
  title        = {Hash-AV: fast virus signature scanning by cache-resident filters},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {50--59},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012824},
  doi          = {10.1504/IJSN.2007.012824},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ErdoganC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/FinniginMRP07,
  author       = {Kevin M. Finnigin and
                  Barry E. Mullins and
                  Richard A. Raines and
                  Henry B. Potoczny},
  title        = {Cryptanalysis of an elliptic curve cryptosystem for wireless sensor
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {260--271},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013179},
  doi          = {10.1504/IJSN.2007.013179},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/FinniginMRP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GuLCZ07,
  author       = {Qijun Gu and
                  Peng Liu and
                  Chao{-}Hsien Chu and
                  Sencun Zhu},
  title        = {Defence against packet injection in ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {154--169},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012832},
  doi          = {10.1504/IJSN.2007.012832},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/GuLCZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HoeperG07,
  author       = {Katrin Hoeper and
                  Guang Gong},
  title        = {Preventing or utilising key escrow in identity-based schemes employed
                  in mobile ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {239--250},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013177},
  doi          = {10.1504/IJSN.2007.013177},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HoeperG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HsuZH07,
  author       = {Hung{-}Yuan Hsu and
                  Sencun Zhu and
                  Ali R. Hurson},
  title        = {{LIP:} a lightweight interlayer protocol for preventing packet injection
                  attacks in mobile ad hoc network},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {202--215},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013174},
  doi          = {10.1504/IJSN.2007.013174},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HsuZH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Huang07,
  author       = {Dijiang Huang},
  title        = {Pseudonym-based cryptography for anonymous communications in mobile
                  ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {272--283},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013180},
  doi          = {10.1504/IJSN.2007.013180},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Huang07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KorkmazGSD07,
  author       = {Turgay Korkmaz and
                  Chao Gong and
                  Kamil Sara{\c{c}} and
                  Sandra G. Dykes},
  title        = {Single packet {IP} traceback in AS-level partial deployment scenario},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {95--108},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012828},
  doi          = {10.1504/IJSN.2007.012828},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/KorkmazGSD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiLC07,
  author       = {Ruidong Li and
                  Jie Li and
                  Hsiao{-}Hwa Chen},
  title        = {{DKMS:} distributed hierarchical access control for multimedia networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {3--10},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012821},
  doi          = {10.1504/IJSN.2007.012821},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LingZ07,
  author       = {Hui Ling and
                  Taieb Znati},
  title        = {End-to-end pairwise key establishment using node disjoint secure paths
                  in wireless sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {109--121},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012829},
  doi          = {10.1504/IJSN.2007.012829},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LingZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Malaney07,
  author       = {Robert A. Malaney},
  title        = {Securing Wi-Fi networks with position verification: extended version},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {27--36},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012822},
  doi          = {10.1504/IJSN.2007.012822},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Malaney07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MichailPTKG07,
  author       = {Harris E. Michail and
                  George A. Panagiotakopoulos and
                  Vasilis N. Thanasoulis and
                  Athanasios Kakarountas and
                  Costas E. Goutis},
  title        = {Server side hashing core exceeding 3 Gbps of throughput},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {228--238},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013176},
  doi          = {10.1504/IJSN.2007.013176},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MichailPTKG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/OliveiraWLD07,
  author       = {Leonardo B. Oliveira and
                  Hao Chi Wong and
                  Antonio Alfredo Ferreira Loureiro and
                  Ricardo Dahab},
  title        = {On the design of secure protocols for hierarchical sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {216--227},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013175},
  doi          = {10.1504/IJSN.2007.013175},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/OliveiraWLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/PanCS07,
  author       = {Jianping Pan and
                  Lin Cai and
                  Xuemin Shen},
  title        = {Vulnerabilities in distance-indexed {IP} traceback schemes},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {81--94},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012827},
  doi          = {10.1504/IJSN.2007.012827},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/PanCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RabinovichS07,
  author       = {Paul Rabinovich and
                  Robert Simon},
  title        = {Secure message delivery in publish/subscribe networks using overlay
                  multicast},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {60--70},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012825},
  doi          = {10.1504/IJSN.2007.012825},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/RabinovichS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SakarindrA07,
  author       = {Pitipatana Sakarindr and
                  Nirwan Ansari},
  title        = {Adaptive trust-based anonymous network},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {11--26},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012820},
  doi          = {10.1504/IJSN.2007.012820},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SakarindrA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SunS07,
  author       = {Fangting Sun and
                  Mark A. Shayman},
  title        = {On pairwise connectivity of wireless multihop networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {37--49},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012823},
  doi          = {10.1504/IJSN.2007.012823},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/SunS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/TartaryW07,
  author       = {Christophe Tartary and
                  Huaxiong Wang},
  title        = {Efficient multicast stream authentication for the fully adversarial
                  network model},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {175--191},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013172},
  doi          = {10.1504/IJSN.2007.013172},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/TartaryW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhuFBZ07,
  author       = {Ye Zhu and
                  Xinwen Fu and
                  Riccardo Bettati and
                  Wei Zhao},
  title        = {Analysis of flow-correlation attacks in anonymity network},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {1/2},
  pages        = {137--153},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.012831},
  doi          = {10.1504/IJSN.2007.012831},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhuFBZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics