Journal cover image

Browse issues

Vol. 13
Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Security and Networks

2014 Vol. 9 No. 2


PagesTitle and authors
63-77A black hole attack model using topology approximation for reactive ad-hoc routing protocols
Christopher W. Badenhop; Barry E. Mullins
DOI: 10.1504/IJSN.2014.060755

78-84ECAWSN: eliminating compromised node with the help of auxiliary nodes in wireless sensor network
N. Ambika; G.T. Raju
DOI: 10.1504/IJSN.2014.060743

85-103Security properties analysis in a TPM-based protocol
Y. Seifi; S. Suriadi; E. Foo; C. Boyd
DOI: 10.1504/IJSN.2014.060742

104-113On access control policy assignments and negotiation strategies in automated trust negotiation
Po-Jen Chuang; Ming-Yu Ni
DOI: 10.1504/IJSN.2014.060744

114-123VANISH: a variable advanced network IRC stealth handling system
Wayne C. Henry; Barry E. Mullins
DOI: 10.1504/IJSN.2014.060741