Journal cover image

Browse issues


Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Security and Networks

2009 Vol. 4 No. 3

 

PagesTitle and authors
135-144Deriving a closed-form expression for worm-scanning strategies
Zesheng Chen, Chao Chen, Yubin Li
DOI: 10.1504/IJSN.2009.027339

145-152An efficient One-Time Password authentication scheme using a smart card
Sookyoung Lee, Krishna M. Sivalingam
DOI: 10.1504/IJSN.2009.027340

153-163Using link RTT to passively detect unapproved wireless nodes
Lanier Watkins, Raheem Beyah, Cherita Corbett
DOI: 10.1504/IJSN.2009.027341

164-170Overview of satellite communication networks security: introduction of EAP
Konstantinos E. Drakakis, Athanasios D. Panagopoulos, Panayotis G. Cottis
DOI: 10.1504/IJSN.2009.027342

171-188An escrow-less identity-based group-key agreement protocol for dynamic peer groups
Saikat Chakrabarti, Santosh Chandrasekhar, Mukesh Singhal
DOI: 10.1504/IJSN.2009.027343

189-200Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks
Sven Ehlert, Yacine Rebahi, Thomas Magedanz
DOI: 10.1504/IJSN.2009.027344