Editorial Board
Defending against wireless network intrusion
Estimating the number of hosts corresponding to an intrusion alert while preserving privacy
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
Broadcast encryption based non-interactive key distribution in MANETs
A new definition of homomorphic signature for identity management in mobile cloud computing
Algorithms for a distributed IDS in MANETs
Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
Management and applications of trust in Wireless Sensor Networks: A survey
LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks
Detection and mitigation of sinkhole attacks in wireless sensor networks
Clone wars: Distributed detection of clone attacks in mobile WSNs
Betweenness estimation in OLSR-based multi-hop networks for distributed filtering
Contents