The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communications
2007, volume: 30, number: 11-12

  1. Sghaier Guizani, Hsiao-Hwa Chen, Peter Mueller
    Special issue on Security on Wireless Ad Hoc and Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2311-2313 [Journal]
  2. Yang Xiao, Venkata Krishna Rayi, Bo Sun, Xiaojiang Du, Fei Hu, Michael Galloway
    A survey of key management schemes in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2314-2341 [Journal]
  3. Kuo-Feng Ssu, Chih-Hsun Chou, Li-Wen Cheng
    Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2342-2352 [Journal]
  4. Edith C. H. Ngai, Jiangchuan Liu, Michael R. Lyu
    An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2353-2364 [Journal]
  5. Jang-Ping Sheu, Jui-Che Cheng
    Pair-wise path key establishment in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2365-2374 [Journal]
  6. Hidehisa Nakayama, Nirwan Ansari, Abbas Jamalipour, Nei Kato
    Fault-resilient sensing in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2375-2384 [Journal]
  7. Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
    Adaptive security design with malicious node detection in cluster-based sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2385-2400 [Journal]
  8. Nidal Nasser, Yunfeng Chen
    SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2401-2412 [Journal]
  9. Azzedine Boukerche, Li Xu, Khalil El-Khatib
    Trust-based security for wireless ad hoc and sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2413-2427 [Journal]
  10. Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen, Xiaowen Chu
    A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2428-2441 [Journal]
  11. Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui
    Providing distributed certificate authority service in cluster-based mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2442-2452 [Journal]
  12. Lin Chen, Jean Leneutre
    Toward secure and scalable time synchronization in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2453-2467 [Journal]
  13. Mohammed Boulmalf, Ezedin Barka, Abderrahmane Lakas
    Analysis of the effect of security on data and voice traffic in WLAN. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2468-2477 [Journal]
  14. Ha Duyen Trung, Watit Benjapolakul, Phan Minh Duc
    Performance evaluation and comparison of different ad hoc routing protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2478-2496 [Journal]
  15. Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen, Minyi Guo
    Efficient group key management for multi-privileged groups. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2497-2509 [Journal]
  16. Ala I. Al-Fuqaha, Omar Al-Ibrahim
    Geo-encryption protocol for mobile networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2510-2517 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002