Journal: IJSN

Volume 11, Issue 4

175 -- 187Abubaker Wahaballa, Hu Xiong, Fagen Li, Zhen Qin, Zhiguang Qin. Secure mobile agent-based English auction protocol using identity-based signature scheme
188 -- 195Feng Shao, Shun Zhang, Hong Zhong, Runhua Shi, Jie Cui. Keyword search protocol with privacy preservation using ID-based proxy reencryption
196 -- 203Ye Bi. A hybrid PSO-SVM model for network intrusion detection
204 -- 212Gao Ren, Wang Hui, Zhang Yun. A multi-channel MAC protocol with power control in the distributed cognitive radio networks
213 -- 223Pranav Subramaniam, Abhishek Parakh. A quantum Diffie-Hellman protocol
224 -- 234Zesheng Chen, Chao Chen. Characterising heterogeneity in vulnerable hosts on worm propagation
235 -- 241Pengju He, Xiaomeng Chen, Huazhi Zeng. Wireless sensor network for multi-target detection algorithm based on blind source separation

Volume 11, Issue 3

107 -- 125Mohamed Amine Ferrag, Mehdi Nafa, Salim Ghanemi. EPSA: an efficient and privacy-preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks
126 -- 139Zhengping Jin, Qing Wang, Zhongxian Li. A formal construction of certificateless proxy multi-signature scheme
140 -- 159Kamel Karoui, Fakher Ben Ftima, Henda Ben Ghézala. A framework for firewalls policy representativeness testing based on classification and reversible metrics
160 -- 166Hala Abukhalaf, Jianxin Wang, Shigeng Zhang. Distance outlier detection with a mobile beacon in wireless sensor networks localisation
167 -- 174Sung-Hyun Baek, Jong-Wook Jang. Design and implementation of the smart blackbox system

Volume 11, Issue 1/2

3 -- 11Sharmila Subudhi, Suvasini Panigrahi. Use of fuzzy clustering and support vector machine for detecting fraud in mobile telecommunication networks
12 -- 24Ya-nan Liu, Lein Harn, Lei Mao, Zhangliang Xiong. Full-healing group-key distribution in online social networks
25 -- 36Rupesh Nomula, Mayssaa El Rifai, Pramode K. Verma. Multi-photon tolerant protocols for quantum secure communication in wireless standards
37 -- 47Abhishek Parakh, Pramode Verma, Mahadevan Subramaniam. Improving efficiency of quantum key distribution with probabilistic measurements
48 -- 65Priyanka Dadhich, Kamlesh Dutta, M. C. Govil. Detection of slanders through Euclidean distance similarity assessment for securing e-commerce agents in P2P decentralised electronic communities
66 -- 81Zhijiang Chen, Linqiang Ge, Guobin Xu, Wei Yu, Robert F. Erbacher, Hasan Cam, Nnanna Ekedebe. A threat monitoring system in enterprise networks with smart mobiles
82 -- 93Geethapriya Thamilarasu. iDetect: an intelligent intrusion detection system for wireless body area networks
94 -- 105P. Annadurai, S. Yazhini. Optimising on trust value-based clustering using trust evaluation scheme for ad hoc network