
International Journal of Wireless and Mobile Computing
2007 Vol.2 No.1
Special Issue on Security of Computer Network and Mobile Systems
Guest Editors: Feng Bao, Colin Boyd, Dieter Gollmann, Kwangjo Kim, Kaoru Kurosawa, Masahiro Mambo, Chris Mitchell, Yi Mu, Phillip Rogaway, Willy Susilo, Vijay Varadharajan, Moti Yung and Fangguo Zhang
Pages | Title and author(s) |
4-13 | A security solution for IEEE 802.11's ad hoc mode: password-authentication and group Diffie–Hellman key exchangeEmmanuel Bresson, Olivier Chevassut, David Pointcheval DOI: 10.1504/IJWMC.2007.013791 |
14-27 | Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networksWilliam Stewart, Yang Xiao, Bo Sun, Hsiao-Hwa Chen DOI: 10.1504/IJWMC.2007.013792 |
28-36 | The performance of a watchdog protocol for wireless network securityJin Wook Lee, Yann-Hang Lee, Violet R. Syrotiuk DOI: 10.1504/IJWMC.2007.013793 |
37-46 | A hybrid data mining anomaly detection technique in ad hoc networksYu Liu, Yang Li, Hong Man, Wei Jiang DOI: 10.1504/IJWMC.2007.013794 |
47-58 | Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune systemFrancesco Palmieri, Ugo Fiore DOI: 10.1504/IJWMC.2007.013795 |
59-71 | Denial-of-service resistance in key establishmentJason Smith, Suratose Tritilanunt, Colin Boyd, Juan M. Gonzalez Nieto, Ernest Foo DOI: 10.1504/IJWMC.2007.013796 |
72-85 | DDoS: design, implementation and analysis of automated modelUdaya Kiran Tupakula, Vijay Varadharajan, Ashok Kumar Gajam, Sunil Kumar Vuppala, Pandalaneni Naga Srinivasa Rao DOI: 10.1504/IJWMC.2007.013797 |
86-93 | Grain: a stream cipher for constrained environmentsMartin Hell, Thomas Johansson, Willi Meier DOI: 10.1504/IJWMC.2007.013798 |