Search dblp for Publications

export results for "toc:db/journals/ijsn/ijsn1.bht:"

 download as .bib file

@article{DBLP:journals/ijsn/Al-Karaki06,
  author       = {Jamal N. Al{-}Karaki},
  title        = {Analysis of routing security-energy trade-offs in wireless sensor
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {147--157},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011774},
  doi          = {10.1504/IJSN.2006.011774},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Al-Karaki06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AraziQ06,
  author       = {Ortal Arazi and
                  Hairong Qi},
  title        = {Load-balanced key establishment methodologies in wireless sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {158--166},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011775},
  doi          = {10.1504/IJSN.2006.011775},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AraziQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ChenSM06,
  author       = {Yiqun Chen and
                  Willy Susilo and
                  Yi Mu},
  title        = {Convertible identity-based anonymous designated ring signatures},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {218--225},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011781},
  doi          = {10.1504/IJSN.2006.011781},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ChenSM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/DengHM06,
  author       = {Jing Deng and
                  Richard Han and
                  Shivakant Mishra},
  title        = {Limiting DoS attacks during multihop data delivery in wireless sensor
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {167--178},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011776},
  doi          = {10.1504/IJSN.2006.011776},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/DengHM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/EnglundJ06,
  author       = {H{\aa}kan Englund and
                  Thomas Johansson},
  title        = {Three ways to mount distinguishing attacks on irregularly clocked
                  stream ciphers},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {95--102},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010826},
  doi          = {10.1504/IJSN.2006.010826},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/EnglundJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/EvansWE06,
  author       = {Joseph B. Evans and
                  Weichao Wang and
                  Benjamin J. Ewy},
  title        = {Wireless networking security: open issues in trust, management, interoperation
                  and measurement},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {84--94},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010825},
  doi          = {10.1504/IJSN.2006.010825},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/EvansWE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Franklin06,
  author       = {Matthew K. Franklin},
  title        = {A survey of key evolving cryptosystems},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {46--53},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010822},
  doi          = {10.1504/IJSN.2006.010822},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Franklin06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HamadehK06,
  author       = {Ihab Hamadeh and
                  George Kesidis},
  title        = {A taxonomy of internet traceback},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {54--61},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010823},
  doi          = {10.1504/IJSN.2006.010823},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HamadehK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HwuHLC06,
  author       = {Jing{-}Shyang Hwu and
                  Shih{-}Feng Hsu and
                  Yi{-}Bing Lin and
                  Rong{-}Jaye Chen},
  title        = {End-to-end security mechanisms for {SMS}},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {177--183},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011777},
  doi          = {10.1504/IJSN.2006.011777},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HwuHLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/JhumkaFFS06,
  author       = {Arshad Jhumka and
                  Felix C. Freiling and
                  Christof Fetzer and
                  Neeraj Suri},
  title        = {An approach to synthesise safe systems},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {62--74},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010824},
  doi          = {10.1504/IJSN.2006.010824},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/JhumkaFFS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/JiangLSS06,
  author       = {Yixin Jiang and
                  Chuang Lin and
                  Minghui Shi and
                  Xuemin Shen},
  title        = {A self-encryption authentication protocol for teleconference services},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {198--205},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011779},
  doi          = {10.1504/IJSN.2006.011779},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/JiangLSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/JungG06,
  author       = {Eunjin Jung and
                  Mohamed G. Gouda},
  title        = {Vulnerability analysis of certificate graphs},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {13--23},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010820},
  doi          = {10.1504/IJSN.2006.010820},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/JungG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KaryotisPGM06,
  author       = {Vasileios Karyotis and
                  Symeon Papavassiliou and
                  Mary Grammatikou and
                  Vasilis Maglaris},
  title        = {A novel framework for mobile attack strategy modelling and vulnerability
                  analysis in wireless ad hoc networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {255--265},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011785},
  doi          = {10.1504/IJSN.2006.011785},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KaryotisPGM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/KiayiasY06,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Secure scalable group signature with dynamic joins and separable authorities},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {24--45},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010821},
  doi          = {10.1504/IJSN.2006.010821},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/KiayiasY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/LiuCM06,
  author       = {Yu Liu and
                  Cristina Comaniciu and
                  Hong Man},
  title        = {Modelling misbehaviour in ad hoc networks: a game theoretic approach
                  for intrusion detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {243--254},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011784},
  doi          = {10.1504/IJSN.2006.011784},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/LiuCM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/OwensL06,
  author       = {Stephen F. Owens and
                  Reuven R. Levary},
  title        = {An adaptive expert system approach for intrusion detection},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {206--217},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011780},
  doi          = {10.1504/IJSN.2006.011780},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/OwensL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/RamkumarM06,
  author       = {Mahalingam Ramkumar and
                  Nasir D. Memon},
  title        = {Secure collaborations over message boards},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {113--124},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010828},
  doi          = {10.1504/IJSN.2006.010828},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/RamkumarM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ShehabBG06,
  author       = {Mohamed Shehab and
                  Elisa Bertino and
                  Arif Ghafoor},
  title        = {Workflow authorisation in mediator-free environments},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {2--12},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010819},
  doi          = {10.1504/IJSN.2006.010819},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ShehabBG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Tan06,
  author       = {Chik How Tan},
  title        = {A new signature scheme without random oracles},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {237--242},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011783},
  doi          = {10.1504/IJSN.2006.011783},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Tan06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/TeoTN06,
  author       = {Joseph Chee Ming Teo and
                  Chik How Tan and
                  Jim Mee Ng},
  title        = {Low-power authenticated group key agreement for heterogeneous wireless
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {226--236},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011782},
  doi          = {10.1504/IJSN.2006.011782},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/TeoTN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Wang06,
  author       = {Xinyuan Wang},
  title        = {The loop fallacy and deterministic serialisation in tracing intrusion
                  connections through stepping stones},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {184--197},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011778},
  doi          = {10.1504/IJSN.2006.011778},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Wang06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/WangSL06,
  author       = {Haodong Wang and
                  Bo Sheng and
                  Qun Li},
  title        = {Elliptic curve cryptography-based access control in sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {127--137},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011772},
  doi          = {10.1504/IJSN.2006.011772},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/WangSL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhengLLA06,
  author       = {Jianliang Zheng and
                  Jie Li and
                  Myung J. Lee and
                  Michael Anshel},
  title        = {A lightweight encryption and authentication scheme for wireless sensor
                  networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {3/4},
  pages        = {138--146},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.011773},
  doi          = {10.1504/IJSN.2006.011773},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhengLLA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhuJK06,
  author       = {Bo Zhu and
                  Sushil Jajodia and
                  Mohan S. Kankanhalli},
  title        = {Building trust in peer-to-peer systems: a review},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {103--112},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010827},
  doi          = {10.1504/IJSN.2006.010827},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhuJK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics