Journal cover image

Browse issues


Vol. 13
Vol. 12
Vol. 11
Vol. 10
Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1

International Journal of Wireless and Mobile Computing

2007 Vol. 2 No. 1

Special Issue on Security of Computer Network and Mobile Systems

Guest Editors: Feng Bao, Colin Boyd, Dieter Gollmann, Kwangjo Kim, Kaoru Kurosawa, Masahiro Mambo, Chris Mitchell, Yi Mu, Phillip Rogaway, Willy Susilo, Vijay Varadharajan, Moti Yung and Fangguo Zhang

 

Editorial
PagesTitle and authors
4-13A security solution for IEEE 802.11's ad hoc mode: password-authentication and group Diffie–Hellman key exchange
Emmanuel Bresson, Olivier Chevassut, David Pointcheval
DOI: 10.1504/IJWMC.2007.013791

14-27Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks
William Stewart, Yang Xiao, Bo Sun, Hsiao-Hwa Chen
DOI: 10.1504/IJWMC.2007.013792

28-36The performance of a watchdog protocol for wireless network security
Jin Wook Lee, Yann-Hang Lee, Violet R. Syrotiuk
DOI: 10.1504/IJWMC.2007.013793

37-46A hybrid data mining anomaly detection technique in ad hoc networks
Yu Liu, Yang Li, Hong Man, Wei Jiang
DOI: 10.1504/IJWMC.2007.013794

47-58Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system
Francesco Palmieri, Ugo Fiore
DOI: 10.1504/IJWMC.2007.013795

59-71Denial-of-service resistance in key establishment
Jason Smith, Suratose Tritilanunt, Colin Boyd, Juan M. Gonzalez Nieto, Ernest Foo
DOI: 10.1504/IJWMC.2007.013796

72-85DDoS: design, implementation and analysis of automated model
Udaya Kiran Tupakula, Vijay Varadharajan, Ashok Kumar Gajam, Sunil Kumar Vuppala, Pandalaneni Naga Srinivasa Rao
DOI: 10.1504/IJWMC.2007.013797

86-93Grain: a stream cipher for constrained environments
Martin Hell, Thomas Johansson, Willi Meier
DOI: 10.1504/IJWMC.2007.013798