International Journal of Security and Networks
2009 Vol.4 No.3
Pages | Title and author(s) |
135-144 | Deriving a closed-form expression for worm-scanning strategiesZesheng Chen, Chao Chen, Yubin Li DOI: 10.1504/IJSN.2009.027339 |
145-152 | An efficient One-Time Password authentication scheme using a smart cardSookyoung Lee, Krishna M. Sivalingam DOI: 10.1504/IJSN.2009.027340 |
153-163 | Using link RTT to passively detect unapproved wireless nodesLanier Watkins, Raheem Beyah, Cherita Corbett DOI: 10.1504/IJSN.2009.027341 |
164-170 | Overview of satellite communication networks security: introduction of EAPKonstantinos E. Drakakis, Athanasios D. Panagopoulos, Panayotis G. Cottis DOI: 10.1504/IJSN.2009.027342 |
171-188 | An escrow-less identity-based group-key agreement protocol for dynamic peer groupsSaikat Chakrabarti, Santosh Chandrasekhar, Mukesh Singhal DOI: 10.1504/IJSN.2009.027343 |
189-200 | Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networksSven Ehlert, Yacine Rebahi, Thomas Magedanz DOI: 10.1504/IJSN.2009.027344 |