Journal cover image

Browse issues

Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Internet Technology and Secured Transactions

2010 Vol. 2 No. 1/2

Special Issue on Security Enhancement

Guest Editors: Dr. Fredrick Japhet Mtenzi, Dr. Al-Dahoud Ali and Galyna Akmayeva


PagesTitle and authors
5-31LH*RSP2P: a fast and high churn resistant scalable distributed data structure for P2P systems
Hanafi Yakouben, Sahri Soror
DOI: 10.1504/IJITST.2010.031470

32-58A novel approach against the system buffer overflow
Yi-Tung F. Chan, Galyna A. Akmayeva, Charles A. Shoniregun
DOI: 10.1504/IJITST.2010.031471

59-87Forty years of movie hacking: considering the potential implications of the popular media representation of computer hackers from 1968 to 2008
Damian Gordon
DOI: 10.1504/IJITST.2010.031472

88-108Malicious node detection system in wireless sensor networks: a decentralised approach
Maryam Fanaeepour, Mohammad Reza Kangavari
DOI: 10.1504/IJITST.2010.031473

109-121Security of internet-connected computer networks
I. Tutanescu, E. Sofron, M. Ali
DOI: 10.1504/IJITST.2010.031474

122-136A lightweight secure architecture for wireless sensor networks
Michael Collins, Simon Dobson, Paddy Nixon
DOI: 10.1504/IJITST.2010.031475

137-159Improving TCP performance over mobile ad hoc networks
Ahmad Dalal'ah, Samir Bataineh, Awos O. Kan'an
DOI: 10.1504/IJITST.2010.031476

160-173Providing location privacy in pervasive computing through a hybrid mechanism
Mohsen Sharifi, Leila Naghavian
DOI: 10.1504/IJITST.2010.031477

174-200Trust algorithms in P2P file sharing networks
Semir Daskapan, Indira Nurtanti, Jan Van den Berg
DOI: 10.1504/IJITST.2010.031478