0022-0000

Journal of Computer and System Sciences (JCSS) - Volume 80, Issue 3 论文列表

本期论文列表
Editorial Board

Defending against wireless network intrusion

Estimating the number of hosts corresponding to an intrusion alert while preserving privacy

Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks

Broadcast encryption based non-interactive key distribution in MANETs

A new definition of homomorphic signature for identity management in mobile cloud computing

Algorithms for a distributed IDS in MANETs

Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems

Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers

Management and applications of trust in Wireless Sensor Networks: A survey

LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks

Detection and mitigation of sinkhole attacks in wireless sensor networks

Clone wars: Distributed detection of clone attacks in mobile WSNs

Betweenness estimation in OLSR-based multi-hop networks for distributed filtering

Contents