Journals in DBLP
Sghaier Guizani , Hsiao-Hwa Chen , Peter Mueller Special issue on Security on Wireless Ad Hoc and Sensor Networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2311-2313 [Journal ] Yang Xiao , Venkata Krishna Rayi , Bo Sun , Xiaojiang Du , Fei Hu , Michael Galloway A survey of key management schemes in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2314-2341 [Journal ] Kuo-Feng Ssu , Chih-Hsun Chou , Li-Wen Cheng Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2342-2352 [Journal ] Edith C. H. Ngai , Jiangchuan Liu , Michael R. Lyu An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2353-2364 [Journal ] Jang-Ping Sheu , Jui-Che Cheng Pair-wise path key establishment in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2365-2374 [Journal ] Hidehisa Nakayama , Nirwan Ansari , Abbas Jamalipour , Nei Kato Fault-resilient sensing in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2375-2384 [Journal ] Meng-Yen Hsieh , Yueh-Min Huang , Han-Chieh Chao Adaptive security design with malicious node detection in cluster-based sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2385-2400 [Journal ] Nidal Nasser , Yunfeng Chen SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2401-2412 [Journal ] Azzedine Boukerche , Li Xu , Khalil El-Khatib Trust-based security for wireless ad hoc and sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2413-2427 [Journal ] Yixin Jiang , Chuang Lin , Minghui Shi , Xuemin Shen , Xiaowen Chu A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2428-2441 [Journal ] Y. Dong , Ai Fen Sui , Siu-Ming Yiu , Victor O. K. Li , Lucas Chi Kwong Hui Providing distributed certificate authority service in cluster-based mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2442-2452 [Journal ] Lin Chen , Jean Leneutre Toward secure and scalable time synchronization in ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2453-2467 [Journal ] Mohammed Boulmalf , Ezedin Barka , Abderrahmane Lakas Analysis of the effect of security on data and voice traffic in WLAN. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2468-2477 [Journal ] Ha Duyen Trung , Watit Benjapolakul , Phan Minh Duc Performance evaluation and comparison of different ad hoc routing protocols. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2478-2496 [Journal ] Guojun Wang , Jie Ouyang , Hsiao-Hwa Chen , Minyi Guo Efficient group key management for multi-privileged groups. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2497-2509 [Journal ] Ala I. Al-Fuqaha , Omar Al-Ibrahim Geo-encryption protocol for mobile networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2510-2517 [Journal ]