127 | -- | 137 | Haodong Wang, Bo Sheng, Qun Li. Elliptic curve cryptography-based access control in sensor networks |
138 | -- | 146 | Jianliang Zheng, Jie Li, Myung J. Lee, Michael Anshel. A lightweight encryption and authentication scheme for wireless sensor networks |
147 | -- | 157 | Jamal N. Al-Karaki. Analysis of routing security-energy trade-offs in wireless sensor networks |
158 | -- | 166 | Ortal Arazi, Hairong Qi. Load-balanced key establishment methodologies in wireless sensor networks |
167 | -- | 178 | Jing Deng, Richard Han, Shivakant Mishra. Limiting DoS attacks during multihop data delivery in wireless sensor networks |
177 | -- | 183 | Jing-Shyang Hwu, Shih-Feng Hsu, Yi-Bing Lin, Rong-Jaye Chen. End-to-end security mechanisms for SMS |
184 | -- | 197 | Xinyuan Wang. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones |
198 | -- | 205 | Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen. A self-encryption authentication protocol for teleconference services |
206 | -- | 217 | Stephen F. Owens, Reuven R. Levary. An adaptive expert system approach for intrusion detection |
218 | -- | 225 | Yiqun Chen, Willy Susilo, Yi Mu. Convertible identity-based anonymous designated ring signatures |
226 | -- | 236 | Joseph Chee Ming Teo, Chik-How Tan, Jim Mee Ng. Low-power authenticated group key agreement for heterogeneous wireless networks |
237 | -- | 242 | Chik-How Tan. A new signature scheme without random oracles |
243 | -- | 254 | Yu Liu, Cristina Comaniciu, Hong Man. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection |
255 | -- | 265 | Vasileios Karyotis, Symeon Papavassiliou, Mary Grammatikou, Vasilis Maglaris. A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks |