default search action
International Journal of Security and Networks (IJSN), Volume 5
Volume 5, Number 1, 2010
- S. Malliga, A. Tamilarasi:
A backpressure technique for filtering spoofed traffic at upstream routers. 3-14 - Shih-I Huang, Shiuhpyng Shieh:
Authentication and secret search mechanisms for RFID-aware wireless sensor networks. 15-25 - Yu-Kai Hsiao, Ren-Junn Hwang:
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks. 26-34 - Li Xu, Sisheng Chen, Xinyi Huang, Yi Mu:
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks. 35-44 - Kuo-Yu Tsai, Chien-Lung Hsu, Tzong-Chen Wu:
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks. 45-52 - Ming-Hour Yang:
Lightweight authentication protocol for mobile RFID networks. 53-62 - Ju Wang, G. L. Smith:
A cross-layer authentication design for secure video transportation in wireless sensor network. 63-76
Volume 5, Numbers 2/3, 2010
- Xuefei Leng, Yuanhung Lien, Keith Mayes, Konstantinos Markantonakis:
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing. 79-86 - George C. Dalton II, Kenneth S. Edge, Robert F. Mills, Richard A. Raines:
Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees. 87-95 - Manmeet Mahinderjit Singh, Xue Li:
Trust in RFID-enabled Supply-Chain Management. 96-105 - Michael Hutter, Thomas Plos, Martin Feldhofer:
On the security of RFID devices against implementation attacks. 106-118 - Yasuhiro Imasaki, Yongbing Zhang, Yusheng Ji:
Secure and efficient data transmission in RFID sensor networks. 119-127 - L. Sun:
Security and privacy on low-cost Radio Frequency Identification systems. 128-134 - Xiaowen Zhang, Qinghai Gao, Mohamed K. Saad:
Looking at a class of RFID APs through GNY logic. 135-146 - Susana Garrido Azevedo, João J. Ferreira:
Radio frequency identification: a case study of healthcare organisations. 147-155 - Muhammad Wassim Raad:
A ubiquitous mobile telemedicine system for the elderly using RFID. 156-164 - Mark J. Rodrigues, Kieran James:
Perceived barriers to the widespread commercial use of Radio Frequency Identification technology. 165-172 - Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security. 173-187 - Richard O. Afolabi, Aftab Ahmad, Kiseon Kim:
Security assessments of IEEE 802.15.4 standard based on X.805 framework. 188-197 - Yuhong Dong, Sam Hsu, Saeed Rajput, Bing Wu:
Experimental analysis of application-level intrusion detection algorithms. 198-205
Volume 5, Number 4, 2010
- Zhenyun Zhuang, Ying Li, Zesheng Chen:
Enhancing Intrusion Detection System with proximity information. 207-219 - Tarek Abbes, Adel Bouhoula, Michaël Rusinowitch:
Efficient decision tree for protocol analysis in intrusion detection. 220-235 - Karl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills:
An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols. 236-247 - Zesheng Chen, Chao Chen, Qian Wang:
On the scalability of Delay-Tolerant Botnets. 248-258 - Yinghua Guo, Sylvie Perreau:
Detect DDoS flooding attacks in mobile ad hoc networks. 259-269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.