Journal cover image

Browse issues


Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Security and Networks

2006 Vol. 1 No. 3/4

Special Issue on Security Issues on Sensor Networks

Guest Editors: Yang Xiao, Xiaohua Jia, Bo Sun and Xiaojiang (James) Du

 

Editorial
PagesTitle and authors
127-137Elliptic curve cryptography-based access control in sensor networks
Haodong Wang, Bo Sheng, Qun Li
DOI: 10.1504/IJSN.2006.011772

138-146A lightweight encryption and authentication scheme for wireless sensor networks
Jianliang Zheng, Jie Li, Myung J. Lee, Michael Anshel
DOI: 10.1504/IJSN.2006.011773

147-157Analysis of routing security-energy trade-offs in wireless sensor networks
Jamal N. Al-Karaki
DOI: 10.1504/IJSN.2006.011774

158-166Load-balanced key establishment methodologies in wireless sensor networks
Ortal Araz, Hairong Qi
DOI: 10.1504/IJSN.2006.011775

167-178Limiting DoS attacks during multihop data delivery in wireless sensor networks
Jing Deng, Richard Han, Shivakant Mishra
DOI: 10.1504/IJSN.2006.011776

Additional Papers

177-183End-to-end security mechanisms for SMS
Jing-Shyang Hwu, Shih-Feng Hsu, Yi-Bing Lin, Rong-Jaye Chen
DOI: 10.1504/IJSN.2006.011777

Additional Papers

184-197The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
Xinyuan Wang
DOI: 10.1504/IJSN.2006.011778

Additional Papers

198-205A self-encryption authentication protocol for teleconference services
Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Sherman Shen
DOI: 10.1504/IJSN.2006.011779

Additional Papers

206-217An adaptive expert system approach for intrusion detection
Stephen F. Owens, Reuven R. Levary
DOI: 10.1504/IJSN.2006.011780

Additional Papers

218-225Convertible identity-based anonymous designated ring signatures
Yiqun Chen, Willy Susilo, Yi Mu
DOI: 10.1504/IJSN.2006.011781

Additional Papers

226-236Low-power authenticated group key agreement for heterogeneous wireless networks
Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng
DOI: 10.1504/IJSN.2006.011782

Additional Papers

237-242A new signature scheme without random oracles
Chik How Tan
DOI: 10.1504/IJSN.2006.011783

Additional Papers

243-254Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
Yu Liu, Cristina Comaniciu, Hong Man
DOI: 10.1504/IJSN.2006.011784

Additional Papers

255-265A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks
Vasileios Karyotis, Symeon Papavassiliou, Mary Grammatikou, Vasilis Maglaris
DOI: 10.1504/IJSN.2006.011785