


default search action
Security and Communication Networks, Volume 1
Volume 1, Number 1, January / February 2008
- Norman C. Beaulieu, Hsiao-Hwa Chen, Hamid Sharif:

Editorial. 1-3
- F. Richard Yu, Helen Tang, Victor C. M. Leung, Jie Liu, Chung-Horng Lung:

Biometric-based user authentication in mobile ad hoc networks. 5-16 - Romano Fantacci, Francesco Chiti, Leonardo Maccari:

Fast distributed bi-directional authentication for wireless sensor networks. 17-24 - Fazirulhisyam Hashim, M. Rubaiyat Kibria, Abbas Jamalipour:

Securing the next generation mobile network. 25-43 - Amey Shevtekar, J. Stille, Nirwan Ansari:

On the impacts of low rate DoS attacks on VoIP traffic. 45-56 - Mehrdad Dianati, Romain Alléaume, Maurice Gagnaire, Xuemin Shen:

Architecture and protocols of the future European quantum key distribution network. 57-74 - Yi Qian, Kejie Lu, Bo Rong, David Tipper:

A design of optimal key management scheme for secure and survivable wireless sensor networks. 75-85 - Jiankun Hu

, Fabio Zambetta
:
Security issues in massive online games. 83-92
Volume 1, Number 2, March / April 2008
- Norman C. Beaulieu, Hsiao-Hwa Chen, Hamid Sharif:

Editorial. 99-101
- Jieyan Fan, Dapeng Wu, Kejie Lu, Antonio Nucci:

An efficient data structure for network anomaly detection. 107-124 - Rolf Oppliger, Ralf Hauser:

Protecting TLS-SA implementations for the challenge-response feature of EMV-CAP against challenge collision attacks. 125-134 - Tieyan Li, Robert H. Deng

, Guilin Wang:
The security and improvement of an ultra-lightweight RFID authentication protocol. 135-146 - Daisuke Takahashi, Yang Xiao

:
Retrieving knowledge from auditing log-files for computer and network forensics and accountability. 147-160 - Xiaojiang Du, Mark A. Shayman, Ronald A. Skoog:

Designing fault tolerant networks to prevent poison message failure. 161-177 - Sk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:

Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks. 179-189
Volume 1, Number 3, May / June 2008
- Pin-Han Ho, Zonghua Zhang, Rongxing Lu:

Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal. 191-193
- Lei Tang, Xiaoyan Hong, Phillip G. Bradford:

Privacy-preserving secure relative localization in vehicular networks. 195-204 - Elmar Schoch, Moritz Keppler, Frank Kargl, Michael Weber:

On the security of context-adaptive information dissemination. 205-218 - Yong Xi, Weisong Shi, Loren Schwiebert:

Mobile anonymity of dynamic groups in vehicular networks. 219-231 - Pandurang Kamat, Arati Baliga, Wade Trappe:

Secure, pseudonymous, and auditable communication in vehicular ad hoc networks. 233-244 - Soufiene Djahel

, Farid Naït-Abdesselam, Zonghua Zhang, Ashfaq A. Khokhar:
Defending against packet dropping attack in vehicular ad hoc networks. 245-258 - Shuang Yuan, Chenxi Zhang, Pin-Han Ho:

A secure business framework for file purchasing in vehicular networks. 259-268
Volume 1, Number 4, July / August 2008
- Basel Alawieh, Rana Ejaz Ahmed, Hussein T. Mouftah:

Security impacts on establishing MPLS/BGP VPNs. 269-275 - Jung-San Lee, Chin-Chen Chang:

Preserving data integrity in mobile ad hoc networks with variant Diffie-Hellman protocol. 277-286 - Qi Liao, David A. Cieslak, Aaron Striegel

, Nitesh V. Chawla:
Using selective, short-term memory to improve resilience against DDoS exhaustion attacks. 287-299 - Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang:

A bilateral remote user authentication scheme that preserves user anonymity. 301-308 - Ali Al Shidhani, Victor C. M. Leung:

Local fast re-authentication for 3G-WLAN interworking. 309-323 - Tsern-Huei Lee, Nai-Lun Huang:

An efficient pattern matching scheme in LZW compressed sequences. 325-335 - Christine Laurendeau, Michel Barbeau:

Insider attack attribution using signal strength-based hyperbolic location estimation. 337-349 - Lynn Margaret Batten, Xun Yi

:
Efficient broadcast key distribution with dynamic revocation. 351-362
Volume 1, Number 5, September / October 2008
- Theodore Stergiou, Dimitrios L. Delivasilis, Mark S. Leeson, Ray Yueh-Min Huang:

Special Issue in Clinical Information Systems Security. 371-373
- Demosthenes Vouyioukas

, Georgios Kambourakis, Ilias Maglogiannis, Angelos N. Rouskas, Constantinos Kolias, Stefanos Gritzalis:
Enabling the provision of secure web based m-health services utilizing XML based security models. 375-388 - Fahim K. Sufi

, Ibrahim Khalil
:
Enforcing secured ECG transmission for realtime telemonitoring: A joint encoding, compression, encryption mechanism. 389-405 - Guy C. Hembroff, Yu Cai:

Secure authentication and authorization design for rural-based healthcare institutions. 407-415 - Jelena V. Misic, Vojislav B. Misic:

Enforcing patient privacy in healthcare WSNs through key distribution algorithms. 417-429
Volume 1, Number 6, November / December 2008
- Shiguo Lian, Yan Zhang, Jong Hyuk Park, Paris Kitsos:

Secure multimedia communication. 437-440
- Giovanni Di Crescenzo, Raquel Morera, Faramak Vakil, Vijay K. Varma:

A secure virtual point of service for purchasing digital media content over 3G wireless networks. 441-450 - Markus Dunte, Christoph Ruland:

Realising time limitation for cryptographic keys in secure multimedia distribution. 451-459 - Shuhui Hou, Tetsutaro Uehara, Takashi Satoh, Yoshitaka Morimura, Michihiko Minoh:

Integrating fingerprint with cryptosystem for internet-based live pay-TV system. 461-472 - Simone Teofili, Michele Di Mascolo, Cristina Basile, Giuseppe Bianchi, Stefano Salsano, Alf Zugenmaier:

User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS). 473-485 - Bin Liu, Fenlin Liu, Chunfang Yang:

Stepwise inter-frame correlation-based steganalysis system for video streams. 487-494 - Thomas C. Schmidt, Matthias Wählisch, Olaf Christ, Gabriel Hege:

AuthoCast - a mobility-compliant protocol framework for multicast sender authentication. 495-509 - Tin Yu Wu, Chi-Hsiang Lo, Han-Chieh Chao:

Early security key exchange for encryption in Mobile IPv6 handoff. 511-520

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














