Volume 2,
Number 1,
January / February 2009
- Vladimir B. Balakirsky, Anahit R. Ghazaryan, A. J. Han Vinck:
Mathematical model for constructing passwords from biometrical data.
1-9
- Kumar Simkhada, Tarik Taleb, Yuji Waizumi, Abbas Jamalipour, Yoshiaki Nemoto:
Combating against internet worms in large-scale networks: an autonomic signature-based solution.
11-28
- Debra L. Cook, Vijay K. Gurbani, Michael Daniluk:
Phishwish: a simple and stateless phishing filter.
29-43
- Xu Su, Rajendra V. Boppana:
Crosscheck mechanism to identify malicious nodes in ad hoc networks.
45-54
- Adrian N. Phillips, Barry E. Mullins, Richard A. Raines, Rusty O. Baldwin:
A secure group communication architecture for autonomous unmanned aerial vehicles.
55-69
- Fei Hu, Kyle Wilhelm, Michael Schab, Marcin Lukowiak, Stanislaw Radziszowski, Yang Xiao:
NTRU-based sensor network security: a low-power hardware implementation perspective.
71-81
- Ram Dantu, Prakash Kolan, João W. Cangussu:
Network risk management using attacker profiling.
83-96
Volume 2,
Number 2,
March / April 2009
Guest Editorial
Research Articles
Special Issue Papers
Research Articles
Special Issue Papers
Research Articles
Special Issue Papers
Research Articles
Volume 2,
Number 3,
May / June 2009
Research Articles
- Yingbin Liang, H. Vincent Poor, Shlomo Shamai:
Physical layer security in broadcast networks.
227-238
- Avinash Srinivasan, Jie Wu:
Secure and reliable broadcasting in wireless sensor networks using multi-parent trees.
239-253
- Jian Ren:
An identity-based single-sign-on scheme for computer networks.
255-258
- Yen-Chieh Ouyang, Ching-Tsung Hsueh, Hung-Wei Chen:
Secure authentication policy with evidential signature scheme for WLAN.
259-270
- André König, Matthias Hollick, Tronje Krop, Ralf Steinmetz:
GeoSec: quarantine zones for mobile ad hoc networks.
271-288
- Vasilis Chatzigiannakis, Symeon Papavassiliou, Georgios Androulidakis:
Improving network anomaly detection effectiveness via an integrated multi-metric-multi-link (M3L) PCA-based approach.
289-304
Volume 2,
Number 4,
July / August 2009
Research Articles
- Romano Fantacci, Simone Menci, L. Micciullo, Laura Pierucci:
A secure radio communication system based on an efficient speech watermarking approach.
305-314
- Kaleb Brasee, S. Kami Makki, Sherali Zeadally:
A secure two-factor authentication scheme for single sign-on services.
315-323
- Qing Li, Meiyuan Zhao, Jesse Walker, Yih-Chun Hu, Adrian Perrig, Wade Trappe:
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.
325-340
- Benamar Kadri, Mohammed Feham, Abdallah M'hamed:
Securing reactive routing protocols in MANETs using PKI (PKI-DSR).
341-350
- Abderrezak Rachedi, Abderrahim Benslimane:
Toward a cross-layer monitoring process for mobile ad hoc networks.
351-368
Volume 2,
Number 5,
September / October 2009
Special Issue on:
WiMAX Security and Applications Editorials
Special Issue Papers
- Bharat K. Bhargava, Yu Zhang, Nwokedi C. Idika, Leszek Lilien, Mehdi Azarmi:
Collaborative attacks in WiMAX networks.
373-391
- Jeremy Brown, Xiaojiang Du, Mohsen Guizani:
Efficient rekeying algorithms for WiMAX networks.
392-400
- Wasim El-Hajj, Hazem Hajj, Ezedin Barka, Zaher Dawy, Omar El Hmaissy, Dima Ghaddar, Youssef Aitour:
Optimal WiMax planning with security considerations.
401-412
- Bongkyoung Kwon, Raheem A. Beyah, John A. Copeland:
Key challenges in securing WiMAX mesh networks.
413-426
Research Articles
Volume 2,
Number 6,
November / December 2009
Research Articles
- Bazara I. A. Barry, H. Anthony Chan:
Syntax, and semantics-based signature database for hybrid intrusion detection systems.
457-475
- Chao Zou, Chunxiao Chigan:
An anonymous on-demand source routing in MANETs.
476-491
- Reed Newman, Raheem A. Beyah:
On the performance of using Covert Timing Channels for node authentication.
492-506
- Wassim Itani, Ayman I. Kayssi, Ali Chehab:
Smart encryption channels for securing virtual machine-based networked applications.
507-518
- Di Jin, Pramode K. Verma, Stamatios V. Kartalopoulos:
Fast convergent key distribution algorithms using a dual quantum channel.
519-530
- Yanjiang Yang, Robert H. Deng, Feng Bao:
Privacy-preserving rental services using one-show anonymous credentials.
531-545
- Yuhua Chen, Pramode K. Verma, Subhash Kak:
Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks.
546-554
- Abdelrahman Desoky, Mohamed Younis:
Chestega: chess steganography methodology.
555-566
- Ling Dong, Kefei Chen, Xuejia Lai, Mi Wen:
When is a key establishment protocol correct?
567-579
- Lei Tang, Xiaoyan Hong, Susan V. Vrbsky:
Using camouflaging mobility to protect privacy in mobile ad hoc networks.
580-594
- Panayiotis Kotzanikolaou, Emmanouil Magkos, Dimitrios D. Vergados, Michalis Stefanidakis:
Secure and practical key establishment for distributed sensor networks.
595-610
- Christian Callegari, Stefano Giordano, Michele Pagano:
New statistical approaches for anomaly detection.
611-634
- Juan C. Pelaez, Eduardo B. Fernández, María M. Larrondo-Petrie:
Misuse patterns in VoIP.
635-653
- Ke Meng, Yang Xiao, Susan V. Vrbsky:
Building a wireless capturing tool for WiFi.
654-668
- Wei Wang, Hong Man, Yu Liu:
A framework for intrusion detection systems by social network analysis methods in ad hoc networks.
669-685
- Stamatios V. Kartalopoulos:
K08: a generalized BB84/B92 protocol in quantum cryptography.
686-693
- B. Sathish Babu, Pallapa Venkataram:
Random security scheme selection for mobile transactions.
694-708
Copyright © Fri Mar 12 17:32:06 2010
by Michael Ley (ley@uni-trier.de)