Volume 2,
Number 1/2,
2007
- Ruidong Li, Jie Li, Hsiao-Hwa Chen:
DKMS: distributed hierarchical access control for multimedia networks.
3-10
Electronic Edition (link) BibTeX
- Pitipatana Sakarindr, Nirwan Ansari:
Adaptive trust-based anonymous network.
11-26
Electronic Edition (link) BibTeX
- Robert A. Malaney:
Securing Wi-Fi networks with position verification: extended version.
27-36
Electronic Edition (link) BibTeX
- Fangting Sun, Mark A. Shayman:
On pairwise connectivity of wireless multihop networks.
37-49
Electronic Edition (link) BibTeX
- Ozgun Erdogan, Pei Cao:
Hash-AV: fast virus signature scanning by cache-resident filters.
50-59
Electronic Edition (link) BibTeX
- Paul Rabinovich, Robert Simon:
Secure message delivery in publish/subscribe networks using overlay multicast.
60-70
Electronic Edition (link) BibTeX
- Zesheng Chen, Chuanyi Ji:
Optimal worm-scanning method using vulnerable-host distributions.
71-80
Electronic Edition (link) BibTeX
- Jianping Pan, Lin Cai, Xuemin Shen:
Vulnerabilities in distance-indexed IP traceback schemes.
81-94
Electronic Edition (link) BibTeX
- Turgay Korkmaz, Chao Gong, Kamil Saraç, Sandra G. Dykes:
Single packet IP traceback in AS-level partial deployment scenario.
95-108
Electronic Edition (link) BibTeX
- Hui Ling, Taieb Znati:
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks.
109-121
Electronic Edition (link) BibTeX
- N. Sertac Artan, H. Jonathan Chao:
Design and analysis of a multipacket signature detection system.
122-136
Electronic Edition (link) BibTeX
- Ye Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Analysis of flow-correlation attacks in anonymity network.
137-153
Electronic Edition (link) BibTeX
- Qijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu:
Defence against packet injection in ad hoc networks.
154-169
Electronic Edition (link) BibTeX
Volume 2,
Number 3/4,
2007
- Christophe Tartary, Huaxiong Wang:
Efficient multicast stream authentication for the fully adversarial network model.
175-191
Electronic Edition (link) BibTeX
- Raghav Bhaskar, Javier Herranz, Fabien Laguillaumie:
Aggregate designated verifier signatures and application to secure routing.
192-201
Electronic Edition (link) BibTeX
- Hung-Yuan Hsu, Sencun Zhu, Ali R. Hurson:
LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network.
202-215
Electronic Edition (link) BibTeX
- Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfredo Ferreira Loureiro, Ricardo Dahab:
On the design of secure protocols for hierarchical sensor networks.
216-227
Electronic Edition (link) BibTeX
- Harris E. Michail, George A. Panagiotakopoulos, Vasilis N. Thanasoulis, Athanasios Kakarountas, Costas E. Goutis:
Server side hashing core exceeding 3 Gbps of throughput.
228-238
Electronic Edition (link) BibTeX
- Katrin Hoeper, Guang Gong:
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks.
239-250
Electronic Edition (link) BibTeX
- Zhaohui Cheng, Liqun Chen:
On security proof of McCullagh?Barreto's key agreement protocol and its variants.
251-259
Electronic Edition (link) BibTeX
- Kevin M. Finnigin, Barry E. Mullins, Richard A. Raines, Henry B. Potoczny:
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks.
260-271
Electronic Edition (link) BibTeX
- Dijiang Huang:
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks.
272-283
Electronic Edition (link) BibTeX
- Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval:
Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol.
284-296
Electronic Edition (link) BibTeX
Copyright © Sun May 17 00:03:15 2009
by Michael Ley (ley@uni-trier.de)