Volume 11,
Number 1,
February 2008
Volume 11,
Number 2,
May 2008
- Jooyoung Lee, Douglas R. Stinson:
On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs.
- Chad D. Mano, Andrew Blaich, Qi Liao, Yingxin Jiang, David A. Cieslak, David Salyers, Aaron Striegel:
RIPPS: Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning.
- Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
Passive-Logging Attacks Against Anonymous Communications Systems.
- Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov:
Provably Secure Timed-Release Public Key Encryption.
- HweeHwa Pang, Kian-Lee Tan:
Verifying Completeness of Relational Query Answers from Online Servers.
- Felix Brandt, Tuomas Sandholm:
On the Existence of Unconditionally Privacy-Preserving Auction Protocols.
Volume 11,
Number 3,
March 2008
- Gene Tsudik:
Editorial.
- Qing Zhang, Ting Yu, Peng Ning:
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks.
- Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan:
Redoubtable Sensor Networks.
- Katharine Chang, Kang G. Shin:
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks.
- Liang Xie, Sencun Zhu:
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification.
- Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick McDaniel:
Noninvasive Methods for Host Certification.
Volume 11,
Number 4,
July 2008
- Gildas Avoine, Pascal Junod, Philippe Oechslin:
Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables.
- Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao:
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks.
- Svetlana Radosavac, George V. Moustakides, John S. Baras, Iordanis Koutsopoulos:
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks.
- Young U. Ryu, Hyeun-Suk Rhee:
Evaluation of Intrusion Detection Systems Under a Resource Constraint.
- Joseph Y. Halpern, Vicky Weissman:
Using First-Order Logic to Reason about Policies.
- Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du:
Attack-Resistant Location Estimation in Wireless Sensor Networks.
- Saurabh Ganeriwal, Christina Pöpper, Srdjan Capkun, Mani B. Srivastava:
Secure Time Synchronization in Sensor Networks.
Copyright © Fri Mar 12 17:33:23 2010
by Michael Ley (ley@uni-trier.de)