Journal: Security and Communication Networks

Volume 9, Issue 2

77 -- 86Edith C. H. Ngai. On providing sink anonymity for wireless sensor networks
87 -- 93Geoffrey Ottoy, Tom Hamelinckx, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere. On the choice of the appropriate AES data encryption method for ZigBee nodes
94 -- 105Emmanouil Magkos, Panayiotis Kotzanikolaou. SCN-SI-021 achieving privacy and access control in pervasive computing environments
106 -- 117Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens. Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices
118 -- 129Krzysztof Szczypiorski, Wojciech Mazurczyk. Steganography in IEEE 802.11 OFDM symbols
130 -- 138Martin Werner. Privacy-protected communication for location-based services
139 -- 148Chin-Feng Lee, Chi-Yao Weng, Aneesh Sharma. Steganographic access control in data hiding using run-length encoding and modulo-operations
149 -- 165Christophe Huygens, Nelson Matthys, Wouter Joosen. Optimizing resource and data security in shared sensor networks
166 -- 170Zhiwei Wang. et al
171 -- 183Binod Vaidya, Dimitrios Makrakis, Hussein Mouftah. Two-factor mutual authentication with key agreement in wireless sensor networks