Search dblp for Publications

export results for "toc:db/journals/scn/scn3.bht:"

 download as .bib file

@article{DBLP:journals/scn/AbbadiA10,
  author       = {Imad M. Abbadi and
                  Muntaha Alawneh},
  title        = {Secure information sharing for grid computing},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {6},
  pages        = {486--502},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.157},
  doi          = {10.1002/SEC.157},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AbbadiA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ArenasAS10,
  author       = {Alvaro E. Arenas and
                  Benjamin Aziz and
                  Gheorghe Cosmin Silaghi},
  title        = {Reputation management in collaborative computing systems},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {6},
  pages        = {546--564},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.146},
  doi          = {10.1002/SEC.146},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ArenasAS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AzzouzEK10,
  author       = {Lamia Ben Azzouz and
                  Mohamed Elhoucine Elhdhili and
                  Farouk Kamoun},
  title        = {Towards an efficient reputation based hybrid key management architecture
                  for \emph{ad hoc} networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {261--277},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.130},
  doi          = {10.1002/SEC.130},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/AzzouzEK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BalfeMPP10,
  author       = {Shane Balfe and
                  Andrew D. McDonald and
                  Kenneth G. Paterson and
                  Helen Phillips},
  title        = {Identity crisis: on the problem of namespace design for {ID-PKC} and
                  MANETs},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {6},
  pages        = {535--545},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.145},
  doi          = {10.1002/SEC.145},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BalfeMPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BalfeYP10,
  author       = {Shane Balfe and
                  Po{-}Wah Yau and
                  Kenneth G. Paterson},
  title        = {A guide to trust in mobile ad hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {6},
  pages        = {503--516},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.147},
  doi          = {10.1002/SEC.147},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BalfeYP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BenslimaneAHK10,
  author       = {Abderrahim Benslimane and
                  Chadi Assi and
                  Fred Nen{-}Fu Huang and
                  Stamatios V. Kartalopoulos},
  title        = {Special issue on security in mobile wireless networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {99--101},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.187},
  doi          = {10.1002/SEC.187},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BenslimaneAHK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BergerGJ10,
  author       = {Andreas Berger and
                  Ivan Gojmerac and
                  Oliver Jung},
  title        = {Internet security meets the {IP} multimedia subsystem: an overview},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {185--206},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.142},
  doi          = {10.1002/SEC.142},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BergerGJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BistarelliFOS10,
  author       = {Stefano Bistarelli and
                  Simon N. Foley and
                  Barry O'Sullivan and
                  Francesco Santini},
  title        = {Semiring-based frameworks for trust propagation in small-world networks
                  and coalition formation criteria},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {6},
  pages        = {595--610},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.252},
  doi          = {10.1002/SEC.252},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BistarelliFOS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChuJLYL10,
  author       = {Xiaowen Chu and
                  Yixin Jiang and
                  Chuang Lin and
                  Hao Yin and
                  Bo Li},
  title        = {Providing key recovery capability for mobile communications},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {207--216},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.156},
  doi          = {10.1002/SEC.156},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChuJLYL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ContiPMS10,
  author       = {Mauro Conti and
                  Roberto Di Pietro and
                  Luigi V. Mancini and
                  Angelo Spognardi},
  title        = {eRIPP-FS: Enforcing privacy and security in {RFID}},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {1},
  pages        = {58--70},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.120},
  doi          = {10.1002/SEC.120},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ContiPMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CoronadoC10,
  author       = {Etienne S. Coronado and
                  Soumaya Cherkaoui},
  title        = {Performance analysis of secure on-demand services for wireless vehicular
                  networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {114--129},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.134},
  doi          = {10.1002/SEC.134},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CoronadoC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DabideenSG10,
  author       = {Stephen Dabideen and
                  Bradley R. Smith and
                  J. J. Garcia{-}Luna{-}Aceves},
  title        = {An end-to-end approach to secure routing in MANETs},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {130--149},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.121},
  doi          = {10.1002/SEC.121},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DabideenSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DahshanI10,
  author       = {Hisham Dahshan and
                  James Irvine},
  title        = {A robust self-organized public key management for mobile ad hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {1},
  pages        = {16--30},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.131},
  doi          = {10.1002/SEC.131},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/DahshanI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DimitrakosMS10,
  author       = {Theo Dimitrakos and
                  Fabio Martinelli and
                  Bruce Schneier},
  title        = {Special issue on security and trust management for dynamic coalitions},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {6},
  pages        = {453--455},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.282},
  doi          = {10.1002/SEC.282},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DimitrakosMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FaiglLB10,
  author       = {Zolt{\'{a}}n Faigl and
                  Stefan Lindskog and
                  Anna Brunstr{\"{o}}m},
  title        = {Performance evaluation of IKEv2 authentication methods in next generation
                  wireless networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {1},
  pages        = {83--98},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.114},
  doi          = {10.1002/SEC.114},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FaiglLB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HaasHL10,
  author       = {Jason J. Haas and
                  Yih{-}Chun Hu and
                  Kenneth P. Laberteaux},
  title        = {The impact of key assignment on {VANET} privacy},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {233--249},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.143},
  doi          = {10.1002/SEC.143},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HaasHL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HamouidA10,
  author       = {Khaled Hamouid and
                  Kamel Adi},
  title        = {Secure and robust threshold key management {(SRKM)} scheme for \emph{ad
                  hoc} networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {6},
  pages        = {517--534},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.199},
  doi          = {10.1002/SEC.199},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HamouidA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HeinTK10,
  author       = {Daniel M. Hein and
                  Ronald Toegl and
                  Stefan Kraxberger},
  title        = {An autonomous attestation token to secure mobile agents in disaster
                  response},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {5},
  pages        = {421--438},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.196},
  doi          = {10.1002/SEC.196},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HeinTK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JhiLLGJK10,
  author       = {Yoon{-}chan Jhi and
                  Peng Liu and
                  Lunquan Li and
                  Qijun Gu and
                  Jiwu Jing and
                  George Kesidis},
  title        = {{PWC:} a proactive worm containment solution for enterprise networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {4},
  pages        = {334--354},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.112},
  doi          = {10.1002/SEC.112},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JhiLLGJK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KimS10,
  author       = {Hahnsang Kim and
                  Kang G. Shin},
  title        = {On predictive routing of security contexts in an all-IP network},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {1},
  pages        = {4--15},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.135},
  doi          = {10.1002/SEC.135},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KimS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KleinTM10,
  author       = {Randall W. Klein and
                  Michael A. Temple and
                  Michael J. Mendenhall},
  title        = {Application of wavelet denoising to improve OFDM-based signal detection
                  and classification},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {1},
  pages        = {71--82},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.115},
  doi          = {10.1002/SEC.115},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KleinTM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KoshutanskiM10,
  author       = {Hristo Koshutanski and
                  Antonio Ma{\~{n}}a},
  title        = {Interoperable semantic access control for highly dynamic coalitions},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {6},
  pages        = {565--594},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.148},
  doi          = {10.1002/SEC.148},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KoshutanskiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LaponNVVD10,
  author       = {Jorn Lapon and
                  Vincent Naessens and
                  Bram Verdegem and
                  Pieter Verhaeghe and
                  Bart De Decker},
  title        = {Building advanced applications with the Belgian eID},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {5},
  pages        = {439--451},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.192},
  doi          = {10.1002/SEC.192},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LaponNVVD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LeinmullerSKM10,
  author       = {Tim Leinm{\"{u}}ller and
                  Elmar Schoch and
                  Frank Kargl and
                  Christian Maih{\"{o}}fer},
  title        = {Decentralized position verification in geographic \emph{ad hoc} routing},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {4},
  pages        = {289--302},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.56},
  doi          = {10.1002/SEC.56},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LeinmullerSKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LeusseBG10,
  author       = {Pierre de Leusse and
                  David Brossard and
                  Nektarios Georgalas},
  title        = {Securing business operations in an {SOA}},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {6},
  pages        = {456--485},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.188},
  doi          = {10.1002/SEC.188},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LeusseBG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuBK10,
  author       = {Alex X. Liu and
                  LeRoy A. Bailey and
                  Adithya H. Krishnamurthy},
  title        = {RFIDGuard: a lightweight privacy and authentication protocol for passive
                  {RFID} tags},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {5},
  pages        = {384--393},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.138},
  doi          = {10.1002/SEC.138},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RachediB10,
  author       = {Abderrezak Rachedi and
                  Abderrahim Benslimane},
  title        = {A secure and resistant architecture against attacks for mobile ad
                  hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {150--166},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.116},
  doi          = {10.1002/SEC.116},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RachediB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RoyCC10,
  author       = {Debdutta Barman Roy and
                  Rituparna Chaki and
                  Nabendu Chaki},
  title        = {{BHIDS:} a new, cluster based algorithm for black hole {IDS}},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {278--288},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.144},
  doi          = {10.1002/SEC.144},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RoyCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShivarajSS10,
  author       = {Gayathri Shivaraj and
                  Min Song and
                  Sachin Shetty},
  title        = {Using Hidden Markov Model to detect rogue access points},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {5},
  pages        = {394--407},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.190},
  doi          = {10.1002/SEC.190},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShivarajSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SufiKH10,
  author       = {Fahim K. Sufi and
                  Ibrahim Khalil and
                  Ibrahim Habib},
  title        = {Polynomial distance measurement for {ECG} based biometric authentication},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {4},
  pages        = {303--319},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.76},
  doi          = {10.1002/SEC.76},
  timestamp    = {Tue, 23 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/SufiKH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TaoNL10,
  author       = {Zhiqi Tao and
                  Baikunth Nath and
                  Andrew Lonie},
  title        = {A data clustering approach to discriminating impersonating devices
                  in Wi-Fi networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {1},
  pages        = {44--57},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.141},
  doi          = {10.1002/SEC.141},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TaoNL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TonesiST10,
  author       = {Dario S. Tonesi and
                  Luca Salgarelli and
                  Alessandro Tortelli},
  title        = {Securing the signaling plane in beyond 3G networks: analysis of performance
                  overheads},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {217--232},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.153},
  doi          = {10.1002/SEC.153},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TonesiST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TraynorBEMB10,
  author       = {Patrick Traynor and
                  Kevin R. B. Butler and
                  William Enck and
                  Patrick D. McDaniel and
                  Kevin Borders},
  title        = {malnets: large-scale malicious networks \emph{via} compromised wireless
                  access points},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {102--113},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.149},
  doi          = {10.1002/SEC.149},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/TraynorBEMB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangRZX10,
  author       = {Yong Wang and
                  Byrav Ramamurthy and
                  Xukai Zou and
                  Yuyan Xue},
  title        = {An efficient scheme for removing compromised sensor nodes from wireless
                  sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {4},
  pages        = {320--333},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.89},
  doi          = {10.1002/SEC.89},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangRZX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangSC10,
  author       = {Wei{-}Tong Wang and
                  Kuo{-}Feng Ssu and
                  Wen{-}Chung Chang},
  title        = {Defending Sybil attacks based on neighboring relations in wireless
                  sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {5},
  pages        = {408--420},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.197},
  doi          = {10.1002/SEC.197},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WuLSL10,
  author       = {Isaac Z. Wu and
                  X.{-}Y. Li and
                  M. Song and
                  C.{-}M. Liu},
  title        = {Security in \emph{ad hoc} networks and pervasive computing},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {5},
  pages        = {359--361},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.202},
  doi          = {10.1002/SEC.202},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WuLSL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XiangZW10,
  author       = {Yang Xiang and
                  Wanlei Zhou and
                  Haining Wang},
  title        = {Security in next generation wireless networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {1},
  pages        = {1--3},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.151},
  doi          = {10.1002/SEC.151},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XiangZW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangCC10,
  author       = {Li Yang and
                  Alma Cemerlic and
                  Xiaohui Cui},
  title        = {A Dirichlet reputation system in reliable routing of wireless \emph{ad
                  hoc} network},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {250--260},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.173},
  doi          = {10.1002/SEC.173},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuZ10,
  author       = {Qian Yu and
                  Chang N. Zhang},
  title        = {A lightweight secure data transmission protocol for resource constrained
                  devices},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {5},
  pages        = {362--370},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.140},
  doi          = {10.1002/SEC.140},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YuZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoA10,
  author       = {Shushan Zhao and
                  Akshai K. Aggarwal},
  title        = {{PAPA-UIC:} a design approach and a framework for secure mobile \emph{ad
                  hoc} networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {5},
  pages        = {371--383},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.150},
  doi          = {10.1002/SEC.150},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhouMN10,
  author       = {Hongbo Zhou and
                  Matt W. Mutka and
                  Lionel M. Ni},
  title        = {Secure prophet address allocation for MANETs},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {1},
  pages        = {31--43},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.126},
  doi          = {10.1002/SEC.126},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhouMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhuRWD10,
  author       = {Bo Zhu and
                  Kui Ren and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{PCM:} a privacy-preserving detection mechanism in mobile \emph{ad
                  hoc} networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {167--184},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.122},
  doi          = {10.1002/SEC.122},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhuRWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics