Journal: Security and Communication Networks

Volume 1, Issue 6

437 -- 440Shiguo Lian, Yan Zhang, Jong Hyuk Park, Paris Kitsos. Secure multimedia communication
441 -- 450Giovanni Di Crescenzo, Raquel Morera, Faramak Vakil, Vijay K. Varma. A secure virtual point of service for purchasing digital media content over 3G wireless networks
451 -- 459Markus Dunte, Christoph Ruland. Realising time limitation for cryptographic keys in secure multimedia distribution
461 -- 472Shuhui Hou, Tetsutaro Uehara, Takashi Satoh, Yoshitaka Morimura, Michihiko Minoh. Integrating fingerprint with cryptosystem for internet-based live pay-TV system
473 -- 485Simone Teofili, Michele Di Mascolo, Cristina Basile, Giuseppe Bianchi, Stefano Salsano, Alf Zugenmaier. User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)
487 -- 494Bin Liu, Fenlin Liu, Chunfang Yang. Stepwise inter-frame correlation-based steganalysis system for video streams
495 -- 509Thomas C. Schmidt, Matthias Wählisch, Olaf Christ, Gabriel Hege. AuthoCast - a mobility-compliant protocol framework for multicast sender authentication
511 -- 520Tin Yu Wu, Chi-Hsiang Lo, Han-Chieh Chao. Early security key exchange for encryption in Mobile IPv6 handoff

Volume 1, Issue 5

371 -- 373Theodore Stergiou, Dimitrios Delivasilis, Mark S. Leeson, Ray Yueh-Min Huang. Special Issue in Clinical Information Systems Security
375 -- 388Demosthenes Vouyioukas, Georgios Kambourakis, Ilias Maglogiannis, Angelos N. Rouskas, Constantinos Kolias, Stefanos Gritzalis. Enabling the provision of secure web based m-health services utilizing XML based security models
389 -- 405Fahim Sufi, Ibrahim Khalil. Enforcing secured ECG transmission for realtime telemonitoring: A joint encoding, compression, encryption mechanism
407 -- 415Guy Hembroff, Yu Cai. Secure authentication and authorization design for rural-based healthcare institutions
417 -- 429Jelena V. Misic, Vojislav B. Misic. Enforcing patient privacy in healthcare WSNs through key distribution algorithms

Volume 1, Issue 4

269 -- 275Basel Alawieh, Rana Ejaz Ahmed, Hussein T. Mouftah. Security impacts on establishing MPLS/BGP VPNs
277 -- 286Jung-San Lee, Chin-Chen Chang. Preserving data integrity in mobile ::::ad hoc:::: networks with variant Diffie-Hellman protocol
287 -- 299Qi Liao, David A. Cieslak, Aaron Striegel, Nitesh V. Chawla. Using selective, short-term memory to improve resilience against DDoS exhaustion attacks
301 -- 308Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang. A bilateral remote user authentication scheme that preserves user anonymity
309 -- 323Ali Al Shidhani, Victor C. M. Leung. Local fast re-authentication for 3G-WLAN interworking
325 -- 335Tsern-Huei Lee, Nai-Lun Huang. An efficient pattern matching scheme in LZW compressed sequences
337 -- 349Christine Laurendeau, Michel Barbeau. Insider attack attribution using signal strength-based hyperbolic location estimation
351 -- 362Lynn Margaret Batten, Xun Yi. Efficient broadcast key distribution with dynamic revocation

Volume 1, Issue 3

191 -- 193Pin-Han Ho, Zonghua Zhang, Rongxing Lu. Special Issue on Security and Privacy Preservation in Vehicular Communications Wiley s Security and Communication Networks Journal
195 -- 204Lei Tang, Xiaoyan Hong, Phillip G. Bradford. Privacy-preserving secure relative localization in vehicular networks
205 -- 218Elmar Schoch, Moritz Keppler, Frank Kargl, Michael Weber. On the security of context-adaptive information dissemination
219 -- 231Yong Xi, Weisong Shi, Loren Schwiebert. Mobile anonymity of dynamic groups in vehicular networks
233 -- 244Pandurang Kamat, Arati Baliga, Wade Trappe. Secure, pseudonymous, and auditable communication in vehicular ::::ad hoc:::: networks
245 -- 258Soufiene Djahel, Farid Naït-Abdesselam, Zonghua Zhang, Ashfaq A. Khokhar. Defending against packet dropping attack in vehicular ::::ad hoc:::: networks
259 -- 268Shuang Yuan, Chenxi Zhang, Pin-Han Ho. A secure business framework for file purchasing in vehicular networks

Volume 1, Issue 2

99 -- 101Norman C. Beaulieu, Hsiao-Hwa Chen, Hamid Sharif. Editorial
107 -- 124Jieyan Fan, Dapeng Wu, Kejie Lu, Antonio Nucci. An efficient data structure for network anomaly detection
125 -- 134Rolf Oppliger, Ralf Hauser. Protecting TLS-SA implementations for the challenge-response feature of EMV-CAP against challenge collision attacks
135 -- 146Tieyan Li, Robert H. Deng, Guilin Wang. The security and improvement of an ultra-lightweight RFID authentication protocol
147 -- 160Daisuke Takahashi, Yang Xiao. Retrieving knowledge from auditing log-files for computer and network forensics and accountability
161 -- 177Xiaojiang Du, Mark A. Shayman, Ronald A. Skoog. Designing fault tolerant networks to prevent poison message failure
179 -- 189Sk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto. Anonymous authentication and secure communication protocol for wireless mobile ::::ad hoc:::: networks

Volume 1, Issue 1

1 -- 3Norman C. Beaulieu, Hsiao-Hwa Chen, Hamid Sharif. Editorial
5 -- 16F. Richard Yu, Helen Tang, Victor C. M. Leung, Jie Liu, Chung-Horng Lung. Biometric-based user authentication in mobile ::::ad hoc:::: networks
17 -- 24Romano Fantacci, Francesco Chiti, Leonardo Maccari. Fast distributed bi-directional authentication for wireless sensor networks
25 -- 43Fazirulhisyam Hashim, M. Rubaiyat Kibria, Abbas Jamalipour. Securing the next generation mobile network
45 -- 56Amey Shevtekar, J. Stille, Nirwan Ansari. On the impacts of low rate DoS attacks on VoIP traffic
57 -- 74Mehrdad Dianati, Romain Alleaume, Maurice Gagnaire, Xuemin Shen. Architecture and protocols of the future European quantum key distribution network
75 -- 85Yi Qian, Kejie Lu, Bo Rong, David Tipper. A design of optimal key management scheme for secure and survivable wireless sensor networks
83 -- 92Jiankun Hu, Fabio Zambetta. Security issues in massive online games