Login Help Sitemap
Inderscience Publishers - linking academia, business and industry through research
  • Home
  • For Authors
  • For Librarians
  • Orders
  • Inderscience Online
  • News
  1. International Journal of Security and Networks
  2. Published issues
  3. 2014 Vol.9 No.2
International Journal of Security and Networks (IJSN)

International Journal of Security and Networks

2014 Vol.9 No.2


Pages Title and author(s)
63-77A black hole attack model using topology approximation for reactive ad-hoc routing protocols
Christopher W. Badenhop; Barry E. Mullins
DOI: 10.1504/IJSN.2014.060755
78-84ECAWSN: eliminating compromised node with the help of auxiliary nodes in wireless sensor network
N. Ambika; G.T. Raju
DOI: 10.1504/IJSN.2014.060743
85-103Security properties analysis in a TPM-based protocol
Y. Seifi; S. Suriadi; E. Foo; C. Boyd
DOI: 10.1504/IJSN.2014.060742
104-113On access control policy assignments and negotiation strategies in automated trust negotiation
Po-Jen Chuang; Ming-Yu Ni
DOI: 10.1504/IJSN.2014.060744
114-123VANISH: a variable advanced network IRC stealth handling system
Wayne C. Henry; Barry E. Mullins
DOI: 10.1504/IJSN.2014.060741

 

  • Sign up for new issue alerts
  • Subscribe/buy articles/issues
  • View sample articles
  • Copyright and author entitlement
  • Forthcoming articles
  • Journal information in easy print format (PDF)
  • Publishing with Inderscience: ethical statement
  • Recommend to a librarian (PDF)
  • Feedback to Editor
  • Get permission to reproduce content
  • Find related journals
Keep up-to-date
  • BlogOur Blog
  • TwitterFollow us on Twitter
  • FacebookVisit us on Facebook
  • Our Newsletter (subscribe for free)
  • RSS Feeds
  • New issue alerts
  • Inderscience is a member of publishing organisations including:
  • CrossRef
  • CLOCKSS
Return to top
  • Contact us
  • About Inderscience
  • OAI Repository
  • Privacy and Cookies Statement
  • Terms and Conditions
  • Help
  • Sitemap
  • © Inderscience Enterprises Ltd.