International Journal of Security and Networks
2014 Vol.9 No.2
Pages | Title and author(s) |
63-77 | A black hole attack model using topology approximation for reactive ad-hoc routing protocolsChristopher W. Badenhop; Barry E. Mullins DOI: 10.1504/IJSN.2014.060755 |
78-84 | ECAWSN: eliminating compromised node with the help of auxiliary nodes in wireless sensor networkN. Ambika; G.T. Raju DOI: 10.1504/IJSN.2014.060743 |
85-103 | Security properties analysis in a TPM-based protocolY. Seifi; S. Suriadi; E. Foo; C. Boyd DOI: 10.1504/IJSN.2014.060742 |
104-113 | On access control policy assignments and negotiation strategies in automated trust negotiationPo-Jen Chuang; Ming-Yu Ni DOI: 10.1504/IJSN.2014.060744 |
114-123 | VANISH: a variable advanced network IRC stealth handling systemWayne C. Henry; Barry E. Mullins DOI: 10.1504/IJSN.2014.060741 |