Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

A. Fanian; M. Berenjkoub; H. Saidi; T. A. Gulliver

Volume 2, Issue 2 , Summer and Autumn 2010, , Pages 89-105

http://dx.doi.org/10.22042/isecure.2015.2.2.3

Abstract
  An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have ...  Read More

2. A TESLA-based mutual authentication protocol for GSM networks

A. Fanian; M. Berenjkoub; T. A. Gulliver

Volume 1, Issue 1 , Winter and Spring 2009, , Pages 3-15

http://dx.doi.org/10.22042/isecure.2015.1.1.2

Abstract
  The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated ...  Read More