Volume 1,
Number 1/2,
2006
- Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
Workflow authorisation in mediator-free environments.
2-12
- Eunjin Jung, Mohamed G. Gouda:
Vulnerability analysis of certificate graphs.
13-23
- Aggelos Kiayias, Moti Yung:
Secure scalable group signature with dynamic joins and separable authorities.
24-45
- Matthew K. Franklin:
A survey of key evolving cryptosystems.
46-53
- Ihab Hamadeh, George Kesidis:
A taxonomy of internet traceback.
54-61
- Arshad Jhumka, Felix C. Freiling, Christof Fetzer, Neeraj Suri:
An approach to synthesise safe systems.
62-74
- Joseph B. Evans, Weichao Wang, Benjamin J. Ewy:
Wireless networking security: open issues in trust, management, interoperation and measurement.
84-94
- Håkan Englund, Thomas Johansson:
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers.
95-102
- Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli:
Building trust in peer-to-peer systems: a review.
103-112
- Mahalingam Ramkumar, Nasir D. Memon:
Secure collaborations over message boards.
113-124
Volume 1,
Number 3/4,
2006
- Haodong Wang, Bo Sheng, Qun Li:
Elliptic curve cryptography-based access control in sensor networks.
127-137
- Jianliang Zheng, Jie Li, Myung J. Lee, Michael Anshel:
A lightweight encryption and authentication scheme for wireless sensor networks.
138-146
- Jamal N. Al-Karaki:
Analysis of routing security-energy trade-offs in wireless sensor networks.
147-157
- Ortal Arazi, Hairong Qi:
Load-balanced key establishment methodologies in wireless sensor networks.
158-166
- Jing Deng, Richard Han, Shivakant Mishra:
Limiting DoS attacks during multihop data delivery in wireless sensor networks.
167-178
- Jing-Shyang Hwu, Shih-Feng Hsu, Yi-Bing Lin, Rong-Jaye Chen:
End-to-end security mechanisms for SMS.
177-183
- Xinyuan Wang:
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones.
184-197
- Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen:
A self-encryption authentication protocol for teleconference services.
198-205
- Stephen F. Owens, Reuven R. Levary:
An adaptive expert system approach for intrusion detection.
206-217
- Yiqun Chen, Willy Susilo, Yi Mu:
Convertible identity-based anonymous designated ring signatures.
218-225
- Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng:
Low-power authenticated group key agreement for heterogeneous wireless networks.
226-236
- Chik How Tan:
A new signature scheme without random oracles.
237-242
- Yu Liu, Cristina Comaniciu, Hong Man:
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection.
243-254
- Vasileios Karyotis, Symeon Papavassiliou, Mary Grammatikou, Vasilis Maglaris:
A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks.
255-265
Copyright © Fri Mar 12 17:28:43 2010
by Michael Ley (ley@uni-trier.de)