Journal cover image

Browse issues


Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Security and Networks

2008 Vol. 3 No. 1

 

PagesTitle and authors
1-9Multilayer key establishment for large-scale sensor networks
Panayiotis Kotzanikolaou, Dimitris D. Vergados, Giannis Stergiou, Emmanouil Magkos
DOI: 10.1504/IJSN.2008.016197

10-23Visualisation of wormholes in underwater sensor networks: a distributed approach
Weichao Wang, Jiejun Kong, Bharat Bhargava, Mario Gerla
DOI: 10.1504/IJSN.2008.016198

24-35Syntax vs. semantics: competing approaches to dynamic network intrusion detection
Walter Scheirer, Mooi Choo Chuah
DOI: 10.1504/IJSN.2008.016199

36-46Origins: an approach to trace fast spreading worms to their roots
Andrew L. Burt, Michael Darschewski, Indrajit Ray, Ramakrishna Thurimella, Hailin Wu
DOI: 10.1504/IJSN.2008.016200

47-53A novel Conference Key Management solution for Secure Dynamic Conferencing
Xukai Zou, Yogesh Karandikar
DOI: 10.1504/IJSN.2008.016201

54-62Anonymous authentication protocol for GSM networks
M. Asadpour, B. Sattarzadeh, A. Movaghar
DOI: 10.1504/IJSN.2008.016202

63-77Towards a realistic testbed for wireless network reliability and security performance studies
Fei Hu, Amish Rughoonundon, Laura Celentano
DOI: 10.1504/IJSN.2008.016203