Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             18 results found
no title author magazine year volume issue page(s) type
1 Adaptive security design with malicious node detection in cluster-based sensor networks Hsieh, Meng-Yen
2007
30 11-12 p. 2385-2400
16 p.
article
2 A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks Jiang, Yixin
2007
30 11-12 p. 2428-2441
14 p.
article
3 Analysis of the effect of security on data and voice traffic in WLAN Boulmalf, Mohammed
2007
30 11-12 p. 2468-2477
10 p.
article
4 An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks Ngai, Edith C.H.
2007
30 11-12 p. 2353-2364
12 p.
article
5 A survey of key management schemes in wireless sensor networks Xiao, Yang
2007
30 11-12 p. 2314-2341
28 p.
article
6 Efficient group key management for multi-privileged groups Wang, Guojun
2007
30 11-12 p. 2497-2509
13 p.
article
7 Fault-resilient sensing in wireless sensor networks Nakayama, Hidehisa
2007
30 11-12 p. 2375-2384
10 p.
article
8 Geo-encryption protocol for mobile networks Al-Fuqaha, Ala
2007
30 11-12 p. 2510-2517
8 p.
article
9 IFC Editorial Board 2007
30 11-12 p. IFC-
1 p.
article
10 OBC - Contents 2007
30 11-12 p. OBC-
1 p.
article
11 Pair-wise path key establishment in wireless sensor networks Sheu, Jang-Ping
2007
30 11-12 p. 2365-2374
10 p.
article
12 Performance evaluation and comparison of different ad hoc routing protocols Trung, Ha Duyen
2007
30 11-12 p. 2478-2496
19 p.
article
13 Providing distributed certificate authority service in cluster-based mobile ad hoc networks Dong, Y.
2007
30 11-12 p. 2442-2452
11 p.
article
14 SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks Nasser, Nidal
2007
30 11-12 p. 2401-2412
12 p.
article
15 Special issue on Security on Wireless Ad Hoc and Sensor Networks Guizani, Sghaier
2007
30 11-12 p. 2311-2313
3 p.
article
16 Toward secure and scalable time synchronization in ad hoc networks Chen, Lin
2007
30 11-12 p. 2453-2467
15 p.
article
17 Trust-based security for wireless ad hoc and sensor networks Boukerch, A.
2007
30 11-12 p. 2413-2427
15 p.
article
18 Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks Ssu, Kuo-Feng
2007
30 11-12 p. 2342-2352
11 p.
article
                             18 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands