Journal: J. Comput. Syst. Sci.

Volume 80, Issue 3

499 -- 501Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Mostafa Fouda, Hae Young Lee. Defending against wireless network intrusion
502 -- 519Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou. Estimating the number of hosts corresponding to an intrusion alert while preserving privacy
520 -- 532Yifan Zhao, Swee-Won Lo, Robert H. Deng, Xuhua Ding. Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
533 -- 545Yang Yang. Broadcast encryption based non-interactive key distribution in MANETs
546 -- 553Zhiwei Wang, Guozi Sun, Danwei Chen. A new definition of homomorphic signature for identity management in mobile cloud computing
554 -- 570Paulo Manoel Mafra, Joni da Silva Fraga, Altair Olivo Santin. Algorithms for a distributed IDS in MANETs
571 -- 590Manuel Gil Pérez, Félix Gómez Mármol, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems
591 -- 601Saeed-ur Rehman, Kevin W. Sowerby, Colin Coghill. Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
602 -- 617Guangjie Han, Jinfang Jiang, Lei Shu, Jianwei Niu, Han-Chieh Chao. Management and applications of trust in Wireless Sensor Networks: A survey
618 -- 643Thanassis Giannetsos, Tassos Dimitriou. LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks
644 -- 653Hosein Shafiei, Ahmad Khonsari, H. Derakhshi, P. Mousavi. Detection and mitigation of sinkhole attacks in wireless sensor networks
654 -- 669Mauro Conti, Roberto Di Pietro, Angelo Spognardi. Clone wars: Distributed detection of clone attacks in mobile WSNs
670 -- 685Leonardo Maccari, Renato Lo Cigno. Betweenness estimation in OLSR-based multi-hop networks for distributed filtering