Pages | Title and author(s) |
147-160 | Formal modelling and analysis of XML firewall for service-oriented systemsHaiping Xu, Mihir Ayachit, Abhinay Reddyreddy DOI: 10.1504/IJSN.2008.020089 |
161-172 | Firewall filtering rules analysis for anomalies detectionAdel Bouhoula, Zouheir Trabelsi, Ezedin Barka, Mohammed-Anis Benelbahri DOI: 10.1504/IJSN.2008.020090 |
173-182 | PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor NetworksFeng Li, Avinash Srinivasan, Jie Wu DOI: 10.1504/IJSN.2008.020091 |
183-192 | Verifying security protocols by knowledge analysisXiaoqi Ma, Xiaochun Cheng DOI: 10.1504/IJSN.2008.020092 |
193-200 | An agent-based framework for intrusion detection alert verification and event correlationBenjamin Uphoff, Johnny S. Wong DOI: 10.1504/IJSN.2008.020093 |
201-205 | Secure user-identification and key distribution scheme preserving anonymityS. Tripathy, S. Nandi DOI: 10.1504/IJSN.2008.020094 |
206-215 | ID-based threshold proxy signcryption scheme from bilinear pairingsFagen Li, Xiangjun Xin, Yupu Hu DOI: 10.1504/IJSN.2008.020095 |