Period of time: 2013年1期
Publisher: Inderscience Publishers
Founded in: 2006
Total resources: 24
ISSN: 1747-8405
Subject: TP Automation Technology , Computer Technology
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
International Journal of Security and Networks,volume 3,issue 1
Menu
Multilayer key establishment for large-scale sensor networks
By Kotzanikolaou Panayiotis,Vergados Dimitris D.,Stergiou Giannis,Magkos Emmanouil in (2007)
International Journal of Security and Networks,volume 3,issue 1 , Vol. 3, Iss. 1, 2007-12 , pp.Visualisation of wormholes in underwater sensor networks: a distributed approach
By Wang Weichao,Kong Jiejun,Bhargava Bharat,Gerla Mario in (2007)
International Journal of Security and Networks,volume 3,issue 1 , Vol. 3, Iss. 1, 2007-12 , pp.Syntax vs. semantics: competing approaches to dynamic network intrusion detection
By Scheirer Walter,Chuah Mooi Choo in (2007)
International Journal of Security and Networks,volume 3,issue 1 , Vol. 3, Iss. 1, 2007-12 , pp.Origins: an approach to trace fast spreading worms to their roots
By Burt Andrew L.,Darschewski Michael,Ray Indrajit,Thurimella Ramakrishna,Wu Hailin in (2007)
International Journal of Security and Networks,volume 3,issue 1 , Vol. 3, Iss. 1, 2007-12 , pp.A novel Conference Key Management solution for Secure Dynamic Conferencing
By Zou Xukai,Karandikar Yogesh in (2007)
International Journal of Security and Networks,volume 3,issue 1 , Vol. 3, Iss. 1, 2007-12 , pp.Anonymous authentication protocol for GSM networks
By Asadpour M.,Sattarzadeh B.,Movaghar A. in (2007)
International Journal of Security and Networks,volume 3,issue 1 , Vol. 3, Iss. 1, 2007-12 , pp.Towards a realistic testbed for wireless network reliability and security performance studies
By Hu Fei,Rughoonundon Amish,Celentano Laura in (2007)
International Journal of Security and Networks,volume 3,issue 1 , Vol. 3, Iss. 1, 2007-12 , pp.