International Journal of Security and Networks (IJSN)

International Journal of Security and Networks

2008 Vol.3 No.1

Pages Title and author(s)
1-9Multilayer key establishment for large-scale sensor networks
Panayiotis Kotzanikolaou, Dimitris D. Vergados, Giannis Stergiou, Emmanouil Magkos
DOI: 10.1504/IJSN.2008.016197
10-23Visualisation of wormholes in underwater sensor networks: a distributed approach
Weichao Wang, Jiejun Kong, Bharat Bhargava, Mario Gerla
DOI: 10.1504/IJSN.2008.016198
24-35Syntax vs. semantics: competing approaches to dynamic network intrusion detection
Walter Scheirer, Mooi Choo Chuah
DOI: 10.1504/IJSN.2008.016199
36-46Origins: an approach to trace fast spreading worms to their roots
Andrew L. Burt, Michael Darschewski, Indrajit Ray, Ramakrishna Thurimella, Hailin Wu
DOI: 10.1504/IJSN.2008.016200
47-53A novel Conference Key Management solution for Secure Dynamic Conferencing
Xukai Zou, Yogesh Karandikar
DOI: 10.1504/IJSN.2008.016201
54-62Anonymous authentication protocol for GSM networks
M. Asadpour, B. Sattarzadeh, A. Movaghar
DOI: 10.1504/IJSN.2008.016202
63-77Towards a realistic testbed for wireless network reliability and security performance studies
Fei Hu, Amish Rughoonundon, Laura Celentano
DOI: 10.1504/IJSN.2008.016203