International Journal of Security and Networks
2011 Vol.6 No.4
Pages | Title and author(s) |
181-190 | Is that you? Authentication in a network without identitiesTaehwan Choi; H.B. Acharya; Mohamed G. Gouda DOI: 10.1504/IJSN.2011.045226 |
191-200 | On the (in)security of two Joint Encryption and Error Correction schemesQi Chai; Guang Gong DOI: 10.1504/IJSN.2011.045227 |
201-210 | An epidemic model with adaptive virus spread control for Wireless Sensor NetworksShensheng Tang; Wei Li DOI: 10.1504/IJSN.2011.045228 |
211-225 | KL-sense secure image steganographyGuoqi Luo; K.P. Subbalakshmi DOI: 10.1504/IJSN.2011.045229 |
226-236 | Friendship-based location privacy in Mobile Social NetworksWei Chang; Jie Wu; Chiu C. Tan DOI: 10.1504/IJSN.2011.045230 |
237-248 | Authenticating strangers in Online Social NetworksXinxin Zhao; Lingjun Li; Guoliang Xue DOI: 10.1504/IJSN.2011.045231 |