Journal: IJSN

Volume 5, Issue 4

207 -- 219Zhenyun Zhuang, Ying Li, Zesheng Chen. Enhancing Intrusion Detection System with proximity information
220 -- 235Tarek Abbes, Adel Bouhoula, Michaƫl Rusinowitch. Efficient decision tree for protocol analysis in intrusion detection
236 -- 247Karl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills. An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols
248 -- 258Zesheng Chen, Chao Chen, Qian Wang. On the scalability of Delay-Tolerant Botnets
259 -- 269Yinghua Guo, Sylvie Perreau. Detect DDoS flooding attacks in mobile ad hoc networks

Volume 5, Issue 2/3

79 -- 86Xuefei Leng, Yuanhung Lien, Keith Mayes, Konstantinos Markantonakis. An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
87 -- 95George C. Dalton II, Kenneth S. Edge, Robert F. Mills, Richard A. Raines. Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees
96 -- 105Manmeet Mahinderjit Singh, Xue Li. Trust in RFID-enabled Supply-Chain Management
106 -- 118Michael Hutter, Thomas Plos, Martin Feldhofer. On the security of RFID devices against implementation attacks
119 -- 127Yasuhiro Imasaki, Yongbing Zhang, Yusheng Ji. Secure and efficient data transmission in RFID sensor networks
128 -- 134L. Sun. Security and privacy on low-cost Radio Frequency Identification systems
135 -- 146Xiaowen Zhang, Qinghai Gao, Mohamed K. Saad. Looking at a class of RFID APs through GNY logic
147 -- 155Susana Garrido Azevedo, Joao J. Ferreira. Radio frequency identification: a case study of healthcare organisations
173 -- 187H. Guo, Y. Mu, X. Y. Zhang, Z. J. Li. Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
188 -- 197Afolabi O. Richard, Aftab Ahmad, Kiseon Kim. Security assessments of IEEE 802.15.4 standard based on X.805 framework
198 -- 205Yuhong Dong, Sam Hsu, Saeed Rajput, Bing Wu. Experimental analysis of application-level intrusion detection algorithms

Volume 5, Issue 1

3 -- 14S. Malliga, A. Tamilarasi. A backpressure technique for filtering spoofed traffic at upstream routers
15 -- 25Shih-I Huang, Shiuhpyng Shieh. Authentication and secret search mechanisms for RFID-aware wireless sensor networks
26 -- 34Yu-Kai Hsiao, Ren-Junn Hwang. An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
35 -- 44Li Xu, Sisheng Chen, Xinyi Huang, Yi Mu. Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
45 -- 52Kuo-Yu Tsai, Chien-Lung Hsu, Tzong-Chen Wu. Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
53 -- 62Ming-Hour Yang. Lightweight authentication protocol for mobile RFID networks
63 -- 76Ju Wang, G. L. Smith. A cross-layer authentication design for secure video transportation in wireless sensor network