Journal cover image

Browse issues

Vol. 14
Vol. 13
Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Wireless and Mobile Computing

2007 Vol. 2 No. 1

Special Issue on Security of Computer Network and Mobile Systems

Guest Editors: Feng Bao, Colin Boyd, Dieter Gollmann, Kwangjo Kim, Kaoru Kurosawa, Masahiro Mambo, Chris Mitchell, Yi Mu, Phillip Rogaway, Willy Susilo, Vijay Varadharajan, Moti Yung and Fangguo Zhang


PagesTitle and authors
4-13A security solution for IEEE 802.11's ad hoc mode: password-authentication and group Diffie–Hellman key exchange
Emmanuel Bresson, Olivier Chevassut, David Pointcheval
DOI: 10.1504/IJWMC.2007.013791

14-27Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks
William Stewart, Yang Xiao, Bo Sun, Hsiao-Hwa Chen
DOI: 10.1504/IJWMC.2007.013792

28-36The performance of a watchdog protocol for wireless network security
Jin Wook Lee, Yann-Hang Lee, Violet R. Syrotiuk
DOI: 10.1504/IJWMC.2007.013793

37-46A hybrid data mining anomaly detection technique in ad hoc networks
Yu Liu, Yang Li, Hong Man, Wei Jiang
DOI: 10.1504/IJWMC.2007.013794

47-58Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system
Francesco Palmieri, Ugo Fiore
DOI: 10.1504/IJWMC.2007.013795

59-71Denial-of-service resistance in key establishment
Jason Smith, Suratose Tritilanunt, Colin Boyd, Juan M. Gonzalez Nieto, Ernest Foo
DOI: 10.1504/IJWMC.2007.013796

72-85DDoS: design, implementation and analysis of automated model
Udaya Kiran Tupakula, Vijay Varadharajan, Ashok Kumar Gajam, Sunil Kumar Vuppala, Pandalaneni Naga Srinivasa Rao
DOI: 10.1504/IJWMC.2007.013797

86-93Grain: a stream cipher for constrained environments
Martin Hell, Thomas Johansson, Willi Meier
DOI: 10.1504/IJWMC.2007.013798