Journal: IJSN

Volume 1, Issue 3/4

127 -- 137Haodong Wang, Bo Sheng, Qun Li. Elliptic curve cryptography-based access control in sensor networks
138 -- 146Jianliang Zheng, Jie Li, Myung J. Lee, Michael Anshel. A lightweight encryption and authentication scheme for wireless sensor networks
147 -- 157Jamal N. Al-Karaki. Analysis of routing security-energy trade-offs in wireless sensor networks
158 -- 166Ortal Arazi, Hairong Qi. Load-balanced key establishment methodologies in wireless sensor networks
167 -- 178Jing Deng, Richard Han, Shivakant Mishra. Limiting DoS attacks during multihop data delivery in wireless sensor networks
177 -- 183Jing-Shyang Hwu, Shih-Feng Hsu, Yi-Bing Lin, Rong-Jaye Chen. End-to-end security mechanisms for SMS
184 -- 197Xinyuan Wang. The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
198 -- 205Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen. A self-encryption authentication protocol for teleconference services
206 -- 217Stephen F. Owens, Reuven R. Levary. An adaptive expert system approach for intrusion detection
218 -- 225Yiqun Chen, Willy Susilo, Yi Mu. Convertible identity-based anonymous designated ring signatures
226 -- 236Joseph Chee Ming Teo, Chik-How Tan, Jim Mee Ng. Low-power authenticated group key agreement for heterogeneous wireless networks
237 -- 242Chik-How Tan. A new signature scheme without random oracles
243 -- 254Yu Liu, Cristina Comaniciu, Hong Man. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
255 -- 265Vasileios Karyotis, Symeon Papavassiliou, Mary Grammatikou, Vasilis Maglaris. A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks

Volume 1, Issue 1/2

2 -- 12Mohamed Shehab, Elisa Bertino, Arif Ghafoor. Workflow authorisation in mediator-free environments
13 -- 23Eunjin Jung, Mohamed G. Gouda. Vulnerability analysis of certificate graphs
24 -- 45Aggelos Kiayias, Moti Yung. Secure scalable group signature with dynamic joins and separable authorities
46 -- 53Matthew K. Franklin. A survey of key evolving cryptosystems
54 -- 61Ihab Hamadeh, George Kesidis. A taxonomy of internet traceback
62 -- 74Arshad Jhumka, Felix C. Freiling, Christof Fetzer, Neeraj Suri. An approach to synthesise safe systems
84 -- 94Joseph B. Evans, Weichao Wang, Benjamin J. Ewy. Wireless networking security: open issues in trust, management, interoperation and measurement
95 -- 102HÃ¥kan Englund, Thomas Johansson. Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
103 -- 112Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli. Building trust in peer-to-peer systems: a review
113 -- 124Mahalingam Ramkumar, Nasir D. Memon. Secure collaborations over message boards