Journal list menu
Export Citations
Download PDFs
Guest Editorial
Free Access
free
Wireless network security
- Pages: 269-271
- First Published: 02 May 2006
Research Article
Free to Read
freeToRead
Authenticated encryption protocol with perfect forward secrecy for mobile communication
- Pages: 273-280
- First Published: 02 May 2006
Research Article
Free to Read
freeToRead
Mobility changes anonymity: new passive threats in mobile ad hoc networks
- Pages: 281-293
- First Published: 02 May 2006
Research Article
Free to Read
freeToRead
On-demand public-key management for mobile ad hoc networks
- Pages: 295-306
- First Published: 02 May 2006
Research Article
Free to Read
freeToRead
A new approach for random key pre-distribution in large-scale wireless sensor networks
- Pages: 307-318
- First Published: 02 May 2006
Research Article
Free to Read
freeToRead
Cooperation enforcement schemes for MANETs: a survey
- Pages: 319-332
- First Published: 02 May 2006
Research Article
Free to Read
freeToRead
A secure incentive architecture for ad hoc networks
- Pages: 333-346
- First Published: 02 May 2006
Research Article
Free to Read
freeToRead
A location-based naming mechanism for securing sensor networks†
- Pages: 347-355
- First Published: 02 May 2006
Research Article
Free to Read
freeToRead
DISPOSER: distributed secure position service in mobile ad hoc networks
- Pages: 357-373
- First Published: 02 May 2006
Research Article
Free to Read
freeToRead
Secure cell relay routing protocol for sensor networks
- Pages: 375-391
- First Published: 02 May 2006