International Journal of Security and Networks (IJSN)

International Journal of Security and Networks

2007 Vol.2 No.1/2

Special Issue on Computer and Network Security

Guest Editors: Prof. Hsiao-Hwa Chen and Prof. Mohsen Guizani


Pages Title and author(s)
3-10DKMS: distributed hierarchical access control for multimedia networks
Ruidong Li, Jie Li, Hsiao-Hwa Chen
DOI: 10.1504/IJSN.2007.012821
11-26Adaptive trust-based anonymous network
Pitipatana Sakarindr, Nirwan Ansari
DOI: 10.1504/IJSN.2007.012820
27-36Securing Wi-Fi networks with position verification: extended version
Robert A. Malaney
DOI: 10.1504/IJSN.2007.012822
37-49On pairwise connectivity of wireless multihop networks
Fangting Sun, Mark A. Shayman
DOI: 10.1504/IJSN.2007.012823
50-59Hash-AV: fast virus signature scanning by cache-resident filters
Ozgun Erdogan, Pei Cao
DOI: 10.1504/IJSN.2007.012824
60-70Secure message delivery in publish/subscribe networks using overlay multicast
Paul Rabinovich, Robert Simon
DOI: 10.1504/IJSN.2007.012825
71-80Optimal worm-scanning method using vulnerable-host distributions
Zesheng Chen, Chuanyi Ji
DOI: 10.1504/IJSN.2007.012826
81-94Vulnerabilities in distance-indexed IP traceback schemes
Jianping Pan, Lin Cai, Xuemin Sherman Shen
DOI: 10.1504/IJSN.2007.012827
95-108Single packet IP traceback in AS-level partial deployment scenario
Turgay Korkmaz, Chao Gong, Kamil Sarac, Sandra G. Dykes
DOI: 10.1504/IJSN.2007.012828
109-121End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
Hui Ling, Taieb Znati
DOI: 10.1504/IJSN.2007.012829
122-136Design and analysis of a multipacket signature detection system
N. Sertac Artan, H. Jonathan Chao
DOI: 10.1504/IJSN.2007.012830
137-153Analysis of flow-correlation attacks in anonymity network
Ye Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao
DOI: 10.1504/IJSN.2007.012831
154-169Defence against packet injection in ad hoc networks
Qijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu
DOI: 10.1504/IJSN.2007.012832