
International Journal of Security and Networks
2020 Vol.15 No.2
| Pages | Title and author(s) |
| 67-77 | Optimal network defense strategy selection based on Bayesian gameZeng-Guang Wang; Yu Lu; Xi Li DOI: 10.1504/IJSN.2020.106830 |
| 78-84 | Designing a secure positioning system using blockchain technologyRajrupa Singh; R. Selvakumar DOI: 10.1504/IJSN.2020.106831 |
| 85-92 | An improved weighted centroid localisation algorithm for wireless sensor networks in coal mine undergroundHaibo Liu; Yujie Dong; Fuzhong Wang DOI: 10.1504/IJSN.2020.106834 |
| 93-100 | Wireless corrosion monitoring system based on an interdigital capacitive corrosion sensorAlong Yu; Jiajia Ji; Hao Cao; Hongbing Sun; Jinqiao Dai DOI: 10.1504/IJSN.2020.106835 |
| 101-110 | Secure outsourcing of modular inverses and scalar multiplications on elliptic curvesYuan Ping; Xuyang Guo; Baocang Wang; Jingxian Zhou DOI: 10.1504/IJSN.2020.106832 |
| 111-121 | Fog computing: survey on decoy information technologyWesam Almobaideen; Muhyidean Altarawneh DOI: 10.1504/IJSN.2020.106833 |