![](/images/ico/ico_close.png)
![](/images/ico/ico3.png)
Period of time: 2013年1-2期
Publisher: Inderscience Publishers
Founded in: 2006
Total resources: 24
ISSN: 1747-8405
Subject: TP Automation Technology , Computer Technology
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
International Journal of Security and Networks,volume 2,issue 1-2
Menu
![](/images/ico/ico5.png)
Adaptive trust-based anonymous network
By Sakarindr Pitipatana,Ansari Nirwan in (2007)
International Journal of Security and Networks,volume 2,issue 1-2 , Vol. 2, Iss. 1-2, 2007-03 , pp.![](/images/ico/ico5.png)
Securing Wi-Fi networks with position verification: extended version
By Malaney Robert A. in (2007)
International Journal of Security and Networks,volume 2,issue 1-2 , Vol. 2, Iss. 1-2, 2007-03 , pp.![](/images/ico/ico5.png)
On pairwise connectivity of wireless multihop networks
By Sun Fangting,Shayman Mark A. in (2007)
International Journal of Security and Networks,volume 2,issue 1-2 , Vol. 2, Iss. 1-2, 2007-03 , pp.![](/images/ico/ico5.png)
Hash-AV: fast virus signature scanning by cache-resident filters
By Erdogan Ozgun,Cao Pei in (2007)
International Journal of Security and Networks,volume 2,issue 1-2 , Vol. 2, Iss. 1-2, 2007-03 , pp.![](/images/ico/ico5.png)
Secure message delivery in publish/subscribe networks using overlay multicast
By Rabinovich Paul,Simon Robert in (2007)
International Journal of Security and Networks,volume 2,issue 1-2 , Vol. 2, Iss. 1-2, 2007-03 , pp.![](/images/ico/ico5.png)
Optimal worm-scanning method using vulnerable-host distributions
By Chen Zesheng,Ji Chuanyi in (2007)
International Journal of Security and Networks,volume 2,issue 1-2 , Vol. 2, Iss. 1-2, 2007-03 , pp.![](/images/ico/ico5.png)
Vulnerabilities in distance-indexed IP traceback schemes
By Pan Jianping,Cai Lin,Shen Xuemin Sherman in (2007)
International Journal of Security and Networks,volume 2,issue 1-2 , Vol. 2, Iss. 1-2, 2007-03 , pp.![](/images/ico/ico5.png)
Single packet IP traceback in AS-level partial deployment scenario
By Korkmaz Turgay,Gong Chao,Sarac Kamil,Dykes Sandra G. in (2007)
International Journal of Security and Networks,volume 2,issue 1-2 , Vol. 2, Iss. 1-2, 2007-03 , pp.![](/images/ico/ico5.png)
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
By Ling Hui,Znati Taieb in (2007)
International Journal of Security and Networks,volume 2,issue 1-2 , Vol. 2, Iss. 1-2, 2007-03 , pp.![](/images/ico/ico5.png)
Design and analysis of a multipacket signature detection system
By Artan N. Sertac,Chao H. Jonathan in (2007)
International Journal of Security and Networks,volume 2,issue 1-2 , Vol. 2, Iss. 1-2, 2007-03 , pp.