International Journal of Security and Networks (IJSN)

International Journal of Security and Networks

2009 Vol.4 No.3

Pages Title and author(s)
135-144Deriving a closed-form expression for worm-scanning strategies
Zesheng Chen, Chao Chen, Yubin Li
DOI: 10.1504/IJSN.2009.027339
145-152An efficient One-Time Password authentication scheme using a smart card
Sookyoung Lee, Krishna M. Sivalingam
DOI: 10.1504/IJSN.2009.027340
153-163Using link RTT to passively detect unapproved wireless nodes
Lanier Watkins, Raheem Beyah, Cherita Corbett
DOI: 10.1504/IJSN.2009.027341
164-170Overview of satellite communication networks security: introduction of EAP
Konstantinos E. Drakakis, Athanasios D. Panagopoulos, Panayotis G. Cottis
DOI: 10.1504/IJSN.2009.027342
171-188An escrow-less identity-based group-key agreement protocol for dynamic peer groups
Saikat Chakrabarti, Santosh Chandrasekhar, Mukesh Singhal
DOI: 10.1504/IJSN.2009.027343
189-200Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks
Sven Ehlert, Yacine Rebahi, Thomas Magedanz
DOI: 10.1504/IJSN.2009.027344