Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijsn/ijsn1.bht:"
@article{DBLP:journals/ijsn/Al-Karaki06, author = {Jamal N. Al{-}Karaki}, title = {Analysis of routing security-energy trade-offs in wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {147--157}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011774}, doi = {10.1504/IJSN.2006.011774}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Al-Karaki06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AraziQ06, author = {Ortal Arazi and Hairong Qi}, title = {Load-balanced key establishment methodologies in wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {158--166}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011775}, doi = {10.1504/IJSN.2006.011775}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AraziQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ChenSM06, author = {Yiqun Chen and Willy Susilo and Yi Mu}, title = {Convertible identity-based anonymous designated ring signatures}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {218--225}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011781}, doi = {10.1504/IJSN.2006.011781}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ChenSM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/DengHM06, author = {Jing Deng and Richard Han and Shivakant Mishra}, title = {Limiting DoS attacks during multihop data delivery in wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {167--178}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011776}, doi = {10.1504/IJSN.2006.011776}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/DengHM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/EnglundJ06, author = {H{\aa}kan Englund and Thomas Johansson}, title = {Three ways to mount distinguishing attacks on irregularly clocked stream ciphers}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {95--102}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010826}, doi = {10.1504/IJSN.2006.010826}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/EnglundJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/EvansWE06, author = {Joseph B. Evans and Weichao Wang and Benjamin J. Ewy}, title = {Wireless networking security: open issues in trust, management, interoperation and measurement}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {84--94}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010825}, doi = {10.1504/IJSN.2006.010825}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/EvansWE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Franklin06, author = {Matthew K. Franklin}, title = {A survey of key evolving cryptosystems}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {46--53}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010822}, doi = {10.1504/IJSN.2006.010822}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Franklin06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HamadehK06, author = {Ihab Hamadeh and George Kesidis}, title = {A taxonomy of internet traceback}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {54--61}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010823}, doi = {10.1504/IJSN.2006.010823}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HamadehK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HwuHLC06, author = {Jing{-}Shyang Hwu and Shih{-}Feng Hsu and Yi{-}Bing Lin and Rong{-}Jaye Chen}, title = {End-to-end security mechanisms for {SMS}}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {177--183}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011777}, doi = {10.1504/IJSN.2006.011777}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HwuHLC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/JhumkaFFS06, author = {Arshad Jhumka and Felix C. Freiling and Christof Fetzer and Neeraj Suri}, title = {An approach to synthesise safe systems}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {62--74}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010824}, doi = {10.1504/IJSN.2006.010824}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/JhumkaFFS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/JiangLSS06, author = {Yixin Jiang and Chuang Lin and Minghui Shi and Xuemin Shen}, title = {A self-encryption authentication protocol for teleconference services}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {198--205}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011779}, doi = {10.1504/IJSN.2006.011779}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/JiangLSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/JungG06, author = {Eunjin Jung and Mohamed G. Gouda}, title = {Vulnerability analysis of certificate graphs}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {13--23}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010820}, doi = {10.1504/IJSN.2006.010820}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/JungG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KaryotisPGM06, author = {Vasileios Karyotis and Symeon Papavassiliou and Mary Grammatikou and Vasilis Maglaris}, title = {A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {255--265}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011785}, doi = {10.1504/IJSN.2006.011785}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KaryotisPGM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/KiayiasY06, author = {Aggelos Kiayias and Moti Yung}, title = {Secure scalable group signature with dynamic joins and separable authorities}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {24--45}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010821}, doi = {10.1504/IJSN.2006.010821}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/KiayiasY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/LiuCM06, author = {Yu Liu and Cristina Comaniciu and Hong Man}, title = {Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {243--254}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011784}, doi = {10.1504/IJSN.2006.011784}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/LiuCM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/OwensL06, author = {Stephen F. Owens and Reuven R. Levary}, title = {An adaptive expert system approach for intrusion detection}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {206--217}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011780}, doi = {10.1504/IJSN.2006.011780}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/OwensL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/RamkumarM06, author = {Mahalingam Ramkumar and Nasir D. Memon}, title = {Secure collaborations over message boards}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {113--124}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010828}, doi = {10.1504/IJSN.2006.010828}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsn/RamkumarM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ShehabBG06, author = {Mohamed Shehab and Elisa Bertino and Arif Ghafoor}, title = {Workflow authorisation in mediator-free environments}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {2--12}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010819}, doi = {10.1504/IJSN.2006.010819}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ShehabBG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Tan06, author = {Chik How Tan}, title = {A new signature scheme without random oracles}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {237--242}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011783}, doi = {10.1504/IJSN.2006.011783}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Tan06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/TeoTN06, author = {Joseph Chee Ming Teo and Chik How Tan and Jim Mee Ng}, title = {Low-power authenticated group key agreement for heterogeneous wireless networks}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {226--236}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011782}, doi = {10.1504/IJSN.2006.011782}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/TeoTN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Wang06, author = {Xinyuan Wang}, title = {The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {184--197}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011778}, doi = {10.1504/IJSN.2006.011778}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Wang06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/WangSL06, author = {Haodong Wang and Bo Sheng and Qun Li}, title = {Elliptic curve cryptography-based access control in sensor networks}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {127--137}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011772}, doi = {10.1504/IJSN.2006.011772}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/WangSL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhengLLA06, author = {Jianliang Zheng and Jie Li and Myung J. Lee and Michael Anshel}, title = {A lightweight encryption and authentication scheme for wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {3/4}, pages = {138--146}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.011773}, doi = {10.1504/IJSN.2006.011773}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhengLLA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhuJK06, author = {Bo Zhu and Sushil Jajodia and Mohan S. Kankanhalli}, title = {Building trust in peer-to-peer systems: a review}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {103--112}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010827}, doi = {10.1504/IJSN.2006.010827}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhuJK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.