Maccari, Leonardo; Lo Cigno, Renato Betweenness estimation in OLSR-based multi-hop networks for distributed filtering. (English) Zbl 1311.68063 J. Comput. Syst. Sci. 80, No. 3, 670-685 (2014). MSC: 68P25 PDFBibTeX XMLCite \textit{L. Maccari} and \textit{R. Lo Cigno}, J. Comput. Syst. Sci. 80, No. 3, 670--685 (2014; Zbl 1311.68063) Full Text: DOI
Conti, M.; Di Pietro, R.; Spognardi, A. Clone wars: distributed detection of clone attacks in mobile WSNs. (English) Zbl 1311.68058 J. Comput. Syst. Sci. 80, No. 3, 654-669 (2014). MSC: 68P25 68M12 PDFBibTeX XMLCite \textit{M. Conti} et al., J. Comput. Syst. Sci. 80, No. 3, 654--669 (2014; Zbl 1311.68058) Full Text: DOI
Shafiei, H.; Khonsari, A.; Derakhshi, H.; Mousavi, P. Detection and mitigation of sinkhole attacks in wireless sensor networks. (English) Zbl 1311.68066 J. Comput. Syst. Sci. 80, No. 3, 644-653 (2014). MSC: 68P25 PDFBibTeX XMLCite \textit{H. Shafiei} et al., J. Comput. Syst. Sci. 80, No. 3, 644--653 (2014; Zbl 1311.68066) Full Text: DOI
Giannetsos, Thanassis; Dimitriou, Tassos LDAC: a localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks. (English) Zbl 1311.68059 J. Comput. Syst. Sci. 80, No. 3, 618-643 (2014). MSC: 68P25 PDFBibTeX XMLCite \textit{T. Giannetsos} and \textit{T. Dimitriou}, J. Comput. Syst. Sci. 80, No. 3, 618--643 (2014; Zbl 1311.68059) Full Text: DOI
Han, Guangjie; Jiang, Jinfang; Shu, Lei; Niu, Jianwei; Chao, Han-Chieh Management and applications of trust in wireless sensor networks: a survey. (English) Zbl 1311.68061 J. Comput. Syst. Sci. 80, No. 3, 602-617 (2014). MSC: 68P25 PDFBibTeX XMLCite \textit{G. Han} et al., J. Comput. Syst. Sci. 80, No. 3, 602--617 (2014; Zbl 1311.68061) Full Text: DOI
Ur Rehman, Saeed; Sowerby, Kevin W.; Coghill, Colin Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers. (English) Zbl 1311.68065 J. Comput. Syst. Sci. 80, No. 3, 591-601 (2014). MSC: 68P25 PDFBibTeX XMLCite \textit{S. Ur Rehman} et al., J. Comput. Syst. Sci. 80, No. 3, 591--601 (2014; Zbl 1311.68065) Full Text: DOI Link
Gil Pérez, Manuel; Gómez Mármol, Félix; Martínez Pérez, Gregorio; Skarmeta Gómez, Antonio F. Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems. (English) Zbl 1311.68060 J. Comput. Syst. Sci. 80, No. 3, 571-590 (2014). MSC: 68P25 PDFBibTeX XMLCite \textit{M. Gil Pérez} et al., J. Comput. Syst. Sci. 80, No. 3, 571--590 (2014; Zbl 1311.68060) Full Text: DOI
Mafra, P. M.; Fraga, J. S.; Santin, A. O. Algorithms for a distributed IDS in MANETs. (English) Zbl 1311.68064 J. Comput. Syst. Sci. 80, No. 3, 554-570 (2014). MSC: 68P25 68W15 PDFBibTeX XMLCite \textit{P. M. Mafra} et al., J. Comput. Syst. Sci. 80, No. 3, 554--570 (2014; Zbl 1311.68064) Full Text: DOI
Wang, Zhiwei; Sun, Guozi; Chen, Danwei A new definition of homomorphic signature for identity management in mobile cloud computing. (English) Zbl 1311.68068 J. Comput. Syst. Sci. 80, No. 3, 546-553 (2014). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{Z. Wang} et al., J. Comput. Syst. Sci. 80, No. 3, 546--553 (2014; Zbl 1311.68068) Full Text: DOI
Yang, Yang Broadcast encryption based non-interactive key distribution in MANETs. (English) Zbl 1311.68069 J. Comput. Syst. Sci. 80, No. 3, 533-545 (2014). MSC: 68P25 PDFBibTeX XMLCite \textit{Y. Yang}, J. Comput. Syst. Sci. 80, No. 3, 533--545 (2014; Zbl 1311.68069) Full Text: DOI
Zhao, Yifan; Lo, Swee-Won; Deng, Robert H.; Ding, Xuhua Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks. (English) Zbl 1311.94112 J. Comput. Syst. Sci. 80, No. 3, 520-532 (2014). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. Zhao} et al., J. Comput. Syst. Sci. 80, No. 3, 520--532 (2014; Zbl 1311.94112) Full Text: DOI
Wahid, Alif; Leckie, Christopher; Zhou, Chenfeng Estimating the number of hosts corresponding to an intrusion alert while preserving privacy. (English) Zbl 1311.68067 J. Comput. Syst. Sci. 80, No. 3, 502-519 (2014). MSC: 68P25 PDFBibTeX XMLCite \textit{A. Wahid} et al., J. Comput. Syst. Sci. 80, No. 3, 502--519 (2014; Zbl 1311.68067) Full Text: DOI
Pathan, Al-Sakib Khan (ed.) Foreword: Defending against wireless network intrusion. (English) Zbl 1280.00047 J. Comput. Syst. Sci. 80, No. 3, 499-501 (2014). MSC: 00B15 00B25 68-06 68M14 68M10 68M20 68M15 PDFBibTeX XMLCite \textit{A.-S. K. Pathan} (ed.), J. Comput. Syst. Sci. 80, No. 3, 499--501 (2014; Zbl 1280.00047) Full Text: DOI