default search action
Security and Communication Networks, Volume 1
Volume 1, Number 1, January / February 2008
- Norman C. Beaulieu, Hsiao-Hwa Chen, Hamid Sharif:
Editorial. 1-3
- F. Richard Yu, Helen Tang, Victor C. M. Leung, Jie Liu, Chung-Horng Lung:
Biometric-based user authentication in mobile ad hoc networks. 5-16 - Romano Fantacci, Francesco Chiti, Leonardo Maccari:
Fast distributed bi-directional authentication for wireless sensor networks. 17-24 - Fazirulhisyam Hashim, M. Rubaiyat Kibria, Abbas Jamalipour:
Securing the next generation mobile network. 25-43 - Amey Shevtekar, J. Stille, Nirwan Ansari:
On the impacts of low rate DoS attacks on VoIP traffic. 45-56 - Mehrdad Dianati, Romain Alléaume, Maurice Gagnaire, Xuemin Shen:
Architecture and protocols of the future European quantum key distribution network. 57-74 - Yi Qian, Kejie Lu, Bo Rong, David Tipper:
A design of optimal key management scheme for secure and survivable wireless sensor networks. 75-85 - Jiankun Hu, Fabio Zambetta:
Security issues in massive online games. 83-92
Volume 1, Number 2, March / April 2008
- Norman C. Beaulieu, Hsiao-Hwa Chen, Hamid Sharif:
Editorial. 99-101
- Jieyan Fan, Dapeng Wu, Kejie Lu, Antonio Nucci:
An efficient data structure for network anomaly detection. 107-124 - Rolf Oppliger, Ralf Hauser:
Protecting TLS-SA implementations for the challenge-response feature of EMV-CAP against challenge collision attacks. 125-134 - Tieyan Li, Robert H. Deng, Guilin Wang:
The security and improvement of an ultra-lightweight RFID authentication protocol. 135-146 - Daisuke Takahashi, Yang Xiao:
Retrieving knowledge from auditing log-files for computer and network forensics and accountability. 147-160 - Xiaojiang Du, Mark A. Shayman, Ronald A. Skoog:
Designing fault tolerant networks to prevent poison message failure. 161-177 - Sk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks. 179-189
Volume 1, Number 3, May / June 2008
- Pin-Han Ho, Zonghua Zhang, Rongxing Lu:
Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal. 191-193
- Lei Tang, Xiaoyan Hong, Phillip G. Bradford:
Privacy-preserving secure relative localization in vehicular networks. 195-204 - Elmar Schoch, Moritz Keppler, Frank Kargl, Michael Weber:
On the security of context-adaptive information dissemination. 205-218 - Yong Xi, Weisong Shi, Loren Schwiebert:
Mobile anonymity of dynamic groups in vehicular networks. 219-231 - Pandurang Kamat, Arati Baliga, Wade Trappe:
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks. 233-244 - Soufiene Djahel, Farid Naït-Abdesselam, Zonghua Zhang, Ashfaq A. Khokhar:
Defending against packet dropping attack in vehicular ad hoc networks. 245-258 - Shuang Yuan, Chenxi Zhang, Pin-Han Ho:
A secure business framework for file purchasing in vehicular networks. 259-268
Volume 1, Number 4, July / August 2008
- Basel Alawieh, Rana Ejaz Ahmed, Hussein T. Mouftah:
Security impacts on establishing MPLS/BGP VPNs. 269-275 - Jung-San Lee, Chin-Chen Chang:
Preserving data integrity in mobile ad hoc networks with variant Diffie-Hellman protocol. 277-286 - Qi Liao, David A. Cieslak, Aaron Striegel, Nitesh V. Chawla:
Using selective, short-term memory to improve resilience against DDoS exhaustion attacks. 287-299 - Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang:
A bilateral remote user authentication scheme that preserves user anonymity. 301-308 - Ali Al Shidhani, Victor C. M. Leung:
Local fast re-authentication for 3G-WLAN interworking. 309-323 - Tsern-Huei Lee, Nai-Lun Huang:
An efficient pattern matching scheme in LZW compressed sequences. 325-335 - Christine Laurendeau, Michel Barbeau:
Insider attack attribution using signal strength-based hyperbolic location estimation. 337-349 - Lynn Margaret Batten, Xun Yi:
Efficient broadcast key distribution with dynamic revocation. 351-362
Volume 1, Number 5, September / October 2008
- Theodore Stergiou, Dimitrios L. Delivasilis, Mark S. Leeson, Ray Yueh-Min Huang:
Special Issue in Clinical Information Systems Security. 371-373
- Demosthenes Vouyioukas, Georgios Kambourakis, Ilias Maglogiannis, Angelos N. Rouskas, Constantinos Kolias, Stefanos Gritzalis:
Enabling the provision of secure web based m-health services utilizing XML based security models. 375-388 - Fahim K. Sufi, Ibrahim Khalil:
Enforcing secured ECG transmission for realtime telemonitoring: A joint encoding, compression, encryption mechanism. 389-405 - Guy Hembroff, Yu Cai:
Secure authentication and authorization design for rural-based healthcare institutions. 407-415 - Jelena V. Misic, Vojislav B. Misic:
Enforcing patient privacy in healthcare WSNs through key distribution algorithms. 417-429
Volume 1, Number 6, November / December 2008
- Shiguo Lian, Yan Zhang, Jong Hyuk Park, Paris Kitsos:
Secure multimedia communication. 437-440
- Giovanni Di Crescenzo, Raquel Morera, Faramak Vakil, Vijay K. Varma:
A secure virtual point of service for purchasing digital media content over 3G wireless networks. 441-450 - Markus Dunte, Christoph Ruland:
Realising time limitation for cryptographic keys in secure multimedia distribution. 451-459 - Shuhui Hou, Tetsutaro Uehara, Takashi Satoh, Yoshitaka Morimura, Michihiko Minoh:
Integrating fingerprint with cryptosystem for internet-based live pay-TV system. 461-472 - Simone Teofili, Michele Di Mascolo, Cristina Basile, Giuseppe Bianchi, Stefano Salsano, Alf Zugenmaier:
User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS). 473-485 - Bin Liu, Fenlin Liu, Chunfang Yang:
Stepwise inter-frame correlation-based steganalysis system for video streams. 487-494 - Thomas C. Schmidt, Matthias Wählisch, Olaf Christ, Gabriel Hege:
AuthoCast - a mobility-compliant protocol framework for multicast sender authentication. 495-509 - Tin Yu Wu, Chi-Hsiang Lo, Han-Chieh Chao:
Early security key exchange for encryption in Mobile IPv6 handoff. 511-520
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.