nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive security design with malicious node detection in cluster-based sensor networks
|
Hsieh, Meng-Yen |
|
2007 |
30 |
11-12 |
p. 2385-2400 16 p. |
artikel |
2 |
A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks
|
Jiang, Yixin |
|
2007 |
30 |
11-12 |
p. 2428-2441 14 p. |
artikel |
3 |
Analysis of the effect of security on data and voice traffic in WLAN
|
Boulmalf, Mohammed |
|
2007 |
30 |
11-12 |
p. 2468-2477 10 p. |
artikel |
4 |
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
|
Ngai, Edith C.H. |
|
2007 |
30 |
11-12 |
p. 2353-2364 12 p. |
artikel |
5 |
A survey of key management schemes in wireless sensor networks
|
Xiao, Yang |
|
2007 |
30 |
11-12 |
p. 2314-2341 28 p. |
artikel |
6 |
Efficient group key management for multi-privileged groups
|
Wang, Guojun |
|
2007 |
30 |
11-12 |
p. 2497-2509 13 p. |
artikel |
7 |
Fault-resilient sensing in wireless sensor networks
|
Nakayama, Hidehisa |
|
2007 |
30 |
11-12 |
p. 2375-2384 10 p. |
artikel |
8 |
Geo-encryption protocol for mobile networks
|
Al-Fuqaha, Ala |
|
2007 |
30 |
11-12 |
p. 2510-2517 8 p. |
artikel |
9 |
IFC Editorial Board
|
|
|
2007 |
30 |
11-12 |
p. IFC- 1 p. |
artikel |
10 |
OBC - Contents
|
|
|
2007 |
30 |
11-12 |
p. OBC- 1 p. |
artikel |
11 |
Pair-wise path key establishment in wireless sensor networks
|
Sheu, Jang-Ping |
|
2007 |
30 |
11-12 |
p. 2365-2374 10 p. |
artikel |
12 |
Performance evaluation and comparison of different ad hoc routing protocols
|
Trung, Ha Duyen |
|
2007 |
30 |
11-12 |
p. 2478-2496 19 p. |
artikel |
13 |
Providing distributed certificate authority service in cluster-based mobile ad hoc networks
|
Dong, Y. |
|
2007 |
30 |
11-12 |
p. 2442-2452 11 p. |
artikel |
14 |
SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks
|
Nasser, Nidal |
|
2007 |
30 |
11-12 |
p. 2401-2412 12 p. |
artikel |
15 |
Special issue on Security on Wireless Ad Hoc and Sensor Networks
|
Guizani, Sghaier |
|
2007 |
30 |
11-12 |
p. 2311-2313 3 p. |
artikel |
16 |
Toward secure and scalable time synchronization in ad hoc networks
|
Chen, Lin |
|
2007 |
30 |
11-12 |
p. 2453-2467 15 p. |
artikel |
17 |
Trust-based security for wireless ad hoc and sensor networks
|
Boukerch, A. |
|
2007 |
30 |
11-12 |
p. 2413-2427 15 p. |
artikel |
18 |
Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks
|
Ssu, Kuo-Feng |
|
2007 |
30 |
11-12 |
p. 2342-2352 11 p. |
artikel |