
International Journal of Security and Networks
2020 Vol.15 No.2
Pages | Title and author(s) |
67-77 | Optimal network defense strategy selection based on Bayesian gameZeng-Guang Wang; Yu Lu; Xi Li DOI: 10.1504/IJSN.2020.106830 |
78-84 | Designing a secure positioning system using blockchain technologyRajrupa Singh; R. Selvakumar DOI: 10.1504/IJSN.2020.106831 |
85-92 | An improved weighted centroid localisation algorithm for wireless sensor networks in coal mine undergroundHaibo Liu; Yujie Dong; Fuzhong Wang DOI: 10.1504/IJSN.2020.106834 |
93-100 | Wireless corrosion monitoring system based on an interdigital capacitive corrosion sensorAlong Yu; Jiajia Ji; Hao Cao; Hongbing Sun; Jinqiao Dai DOI: 10.1504/IJSN.2020.106835 |
101-110 | Secure outsourcing of modular inverses and scalar multiplications on elliptic curvesYuan Ping; Xuyang Guo; Baocang Wang; Jingxian Zhou DOI: 10.1504/IJSN.2020.106832 |
111-121 | Fog computing: survey on decoy information technologyWesam Almobaideen; Muhyidean Altarawneh DOI: 10.1504/IJSN.2020.106833 |