Journal: IJSN

Volume 2, Issue 3/4

175 -- 191Christophe Tartary, Huaxiong Wang. Efficient multicast stream authentication for the fully adversarial network model
192 -- 201Raghav Bhaskar, Javier Herranz, Fabien Laguillaumie. Aggregate designated verifier signatures and application to secure routing
202 -- 215Hung-Yuan Hsu, Sencun Zhu, Ali R. Hurson. LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
216 -- 227Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfredo Ferreira Loureiro, Ricardo Dahab. On the design of secure protocols for hierarchical sensor networks
228 -- 238Harris E. Michail, George A. Panagiotakopoulos, Vasilis N. Thanasoulis, Athanasios Kakarountas, Costas E. Goutis. Server side hashing core exceeding 3 Gbps of throughput
239 -- 250Katrin Hoeper, Guang Gong. Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
251 -- 259Zhaohui Cheng, Liqun Chen. On security proof of McCullagh?Barreto s key agreement protocol and its variants
260 -- 271Kevin M. Finnigin, Barry E. Mullins, Richard A. Raines, Henry B. Potoczny. Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
272 -- 283Dijiang Huang. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
284 -- 296Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval. Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol

Volume 2, Issue 1/2

3 -- 10Ruidong Li, Jie Li, Hsiao-Hwa Chen. DKMS: distributed hierarchical access control for multimedia networks
11 -- 26Pitipatana Sakarindr, Nirwan Ansari. Adaptive trust-based anonymous network
27 -- 36Robert A. Malaney. Securing Wi-Fi networks with position verification: extended version
37 -- 49Fangting Sun, Mark A. Shayman. On pairwise connectivity of wireless multihop networks
50 -- 59Ozgun Erdogan, Pei Cao. Hash-AV: fast virus signature scanning by cache-resident filters
60 -- 70Paul Rabinovich, Robert Simon. Secure message delivery in publish/subscribe networks using overlay multicast
71 -- 80Zesheng Chen, Chuanyi Ji. Optimal worm-scanning method using vulnerable-host distributions
81 -- 94Jianping Pan, Lin Cai, Xuemin Shen. Vulnerabilities in distance-indexed IP traceback schemes
95 -- 108Turgay Korkmaz, Chao Gong, Kamil Saraç, Sandra G. Dykes. Single packet IP traceback in AS-level partial deployment scenario
109 -- 121Hui Ling, Taieb Znati. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
122 -- 136N. Sertac Artan, H. Jonathan Chao. Design and analysis of a multipacket signature detection system
137 -- 153Ye Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao. Analysis of flow-correlation attacks in anonymity network
154 -- 169Qijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu. Defence against packet injection in ad hoc networks