Journal: IET Information Security

Volume 4, Issue 4

188 -- 201Habib F. Rashvand, Khaled Salah, Jose M. Alcaraz Calero, Lein Harn. Distributed security for multi-agent systems - review and applications
202 -- 211Mehrdad Nojoumian, Douglas R. Stinson, Morgan Grainger. Unconditionally secure social secret sharing scheme
212 -- 232Xin Li, Zhiping Jia, Peng Zhang, Ruihua Zhang, Haiyang Wang. Trust-based on-demand multipath routing in mobile ad hoc networks
233 -- 247Stephen Bishop, Hamed Okhravi, Shahram Rahimi, Yung-Chuan Lee. Covert channel resistant information leakage protection using a multi-agent architecture
248 -- 257Chih-Ta Yen, Tzong-Chen Wu, Ming-Huang Guo, Chuan-Kai Yang, Han-Chieh Chao. Digital product transaction mechanism for electronic auction environment
258 -- 272Pitipatana Sakarindr, Nirwan Ansari. Survey of security services on group communications
273 -- 282Christian Damsgaard Jensen. Supporting multi-agent reputation calculation in the Wikipedia Recommender System
283 -- 300Padmalochan Bera, Santosh K. Ghosh, Pallab Dasgupta. Integrated security analysis framework for an enterprise network - a formal approach
301 -- 321Morteza Amini, Rasool Jalili. Multi-level authorisation model and framework for distributed semantic-aware environments
322 -- 332Santosh Chandrasekhar, Saikat Chakrabarti 0002, Mukesh Singhal, Kenneth L. Calvert. Efficient proxy signatures based on trapdoor hash functions
333 -- 343Zubair A. Baig, Khaled Salah. Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks
344 -- 351Meng Yu, Wanyu Zang, Peng Liu. Recovery of data integrity under multi-tier architectures
352 -- 360Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Han-Chieh Chao. Cluster-based secure communication mechanism in wireless ad hoc networks
361 -- 373Yi-Ying Zhang, Han-Chieh Chao, Min Chen, Lei Shu, Chulhyun Park, Myong-Soon Park. Outlier detection and countermeasure for hierarchical wireless sensor networks
374 -- 389Sudip Misra, P. Venkata Krishna, Kiran Isaac Abraham. Adaptive link-state routing and intrusion detection in wireless mesh networks
390 -- 396Hong Wen, Pin-Han Ho, Qi Chai, Guang Gong. Physical layer assisted authentication for distributed ad hoc wireless sensor networks
397 -- 410Fatemeh Raji, Behrouz Tork Ladani. Anonymity and security for autonomous mobile agents
411 -- 421Jose M. Alcaraz Calero, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. Towards an authorisation model for distributed systems based on the Semantic Web