default search action
International Journal of Security and Networks, Volume 6
Volume 6, Number 1, 2011
- Deepa Kundur, Xianyong Feng, Salman Mashayekh, Shan Liu, Takis Zourntos, Karen L. Butler-Purry:
Towards modelling the impact of cyber attacks on a smart grid. 2-13 - Georgios Kalogridis, Stojan Z. Denic, Tim A. Lewis, Rafael Cepeda:
Privacy protection system and metrics for hiding electrical events. 14-27 - Fengjun Li, Bo Luo, Peng Liu:
Secure and privacy-preserving information aggregation for smart grids. 28-39 - Jianqing Zhang, Carl A. Gunter:
Application-aware secure multicast for power grid communications. 40-52 - Benjamin W. P. Ramsey, Barry E. Mullins, Ryan W. Thomas, Todd R. Andel:
Subjective audio quality over a secure IEEE 802.11n network. 53-63
Volume 6, Numbers 2/3, 2011
- Mrinmoy Barua, Xiaohui Liang, Rongxing Lu, Xuemin Shen:
ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing. 67-76 - Neeraj Jaggi, Umesh Marappa Reddy, Rajiv Bagai:
A three dimensional sender anonymity metric. 77-89 - Madhu J. Sharma, Victor C. M. Leung:
Improved IP Multimedia Subsystem authentication mechanism for 3G-WLAN networks. 90-100 - Ahmed Osama Fathy Atya, Tamer A. ElBatt, Moustafa Youssef:
A source authentication scheme using network coding. 101-111 - Ningning Cheng, Kannan Govindan, Prasant Mohapatra:
Rendezvous based trust propagation to enhance distributed network security. 112-122 - Li Liu, Yang Xiao, Jingyuan Zhang, Andrew Faulkner, Keith Weber:
Hidden information in Microsoft Word. 123-135 - Sherman S. M. Chow, Siu-Ming Yiu:
Exclusion-intersection encryption. 136-146 - David J. Walker, Shahram Latifi:
Partial iris and recognition as a viable biometric scheme. 147-152 - Abdelrahman Desoky:
Edustega: an Education-Centric Steganography methodology. 153-173 - Nana K. Ampah, Cajetan M. Akujuobi, Matthew N. O. Sadiku, Shumon Alam:
An intrusion detection technique based on continuous binary communication channels. 174-180
Volume 6, Number 4, 2011
- Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
Is that you? Authentication in a network without identities. 181-190 - Qi Chai, Guang Gong:
On the (in)security of two Joint Encryption and Error Correction schemes. 191-200 - Shensheng Tang, Wei Li:
An epidemic model with adaptive virus spread control for Wireless Sensor Networks. 201-210 - Guoqi Luo, K. P. Subbalakshmi:
KL-sense secure image steganography. 211-225 - Wei Chang, Jie Wu, Chiu C. Tan:
Friendship-based location privacy in Mobile Social Networks. 226-236 - Xinxin Zhao, Lingjun Li, Guoliang Xue:
Authenticating strangers in Online Social Networks. 237-248
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.