International Journal of Security and Networks
2009 Vol.4 No.4
Pages | Title and author(s) |
201-209 | A Proactive Secret Sharing Scheme in matrix projection methodLi Bai, XuKai Zou DOI: 10.1504/IJSN.2009.028667 |
210-222 | TKS: a transition key management scheme for secure application level multicastHatem Bettahar, Mothanna Alkubeily, Abdelmadjid Bouabdallah DOI: 10.1504/IJSN.2009.028668 |
223-233 | Handling inheritance violation for secure interoperation of heterogeneous systemsHejiao Huang, Helene Kirchner, Songyun Liu, Weili Wu DOI: 10.1504/IJSN.2009.028669 |
234-245 | Visibility: a novel concept for characterising provable network digital evidencesSlim Rekhis, Noureddine A. Boudriga DOI: 10.1504/IJSN.2009.028670 |
246-262 | Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc NetworksDjamel Djenouri, Mohamed Bouamama, Othmane Mahmoudi DOI: 10.1504/IJSN.2009.028671 |
263-271 | Attacks and countermeasures in multi-hop Cognitive Radio NetworksFei Hu, De-cun Dong, Yang Xiao DOI: 10.1504/IJSN.2009.028672 |