International Journal of Internet Technology and Secured Transactions (IJITST)

International Journal of Internet Technology and Secured Transactions

2010 Vol.2 No.1/2

Special Issue on Security Enhancement

Guest Editors: Dr. Fredrick Japhet Mtenzi, Dr. Al-Dahoud Ali and Galyna Akmayeva


Pages Title and author(s)
5-31LH*RSP2P: a fast and high churn resistant scalable distributed data structure for P2P systems
Hanafi Yakouben, Sahri Soror
DOI: 10.1504/IJITST.2010.031470
32-58A novel approach against the system buffer overflow
Yi-Tung F. Chan, Galyna A. Akmayeva, Charles A. Shoniregun
DOI: 10.1504/IJITST.2010.031471
59-87Forty years of movie hacking: considering the potential implications of the popular media representation of computer hackers from 1968 to 2008
Damian Gordon
DOI: 10.1504/IJITST.2010.031472
88-108Malicious node detection system in wireless sensor networks: a decentralised approach
Maryam Fanaeepour, Mohammad Reza Kangavari
DOI: 10.1504/IJITST.2010.031473
109-121Security of internet-connected computer networks
I. Tutanescu, E. Sofron, M. Ali
DOI: 10.1504/IJITST.2010.031474
122-136A lightweight secure architecture for wireless sensor networks
Michael Collins, Simon Dobson, Paddy Nixon
DOI: 10.1504/IJITST.2010.031475
137-159Improving TCP performance over mobile ad hoc networks
Ahmad Dalal'ah, Samir Bataineh, Awos O. Kan'an
DOI: 10.1504/IJITST.2010.031476
160-173Providing location privacy in pervasive computing through a hybrid mechanism
Mohsen Sharifi, Leila Naghavian
DOI: 10.1504/IJITST.2010.031477
174-200Trust algorithms in P2P file sharing networks
Semir Daskapan, Indira Nurtanti, Jan Van den Berg
DOI: 10.1504/IJITST.2010.031478