Found: 22
Select item for more details and to access through your institution.
Fair two-party computation with rational parties holding private types.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 284, doi. 10.1002/sec.979
- By:
- Publication type:
- Article
A novel image steganography scheme based on morphological associative memory and permutation schema.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 110, doi. 10.1002/sec.962
- By:
- Publication type:
- Article
A link graph-based approach to identify forum spam.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 176, doi. 10.1002/sec.970
- By:
- Publication type:
- Article
A flexible hierarchical access control mechanism enforcing extension policies.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 189, doi. 10.1002/sec.971
- By:
- Publication type:
- Article
A new multi-use multi-secret sharing scheme based on the duals of minimal linear codes.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 202, doi. 10.1002/sec.972
- By:
- Publication type:
- Article
A survey on secret key generation mechanisms on the physical layer in wireless networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 332, doi. 10.1002/sec.973
- By:
- Publication type:
- Article
Fast anomaly detection using Boxplot rule for multivariate data in cooperative wideband cognitive radio in the presence of jammer.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 212, doi. 10.1002/sec.974
- By:
- Publication type:
- Article
Efficient centralized approach to prevent from replication attack in wireless sensor networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 220, doi. 10.1002/sec.975
- By:
- Publication type:
- Article
Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 232, doi. 10.1002/sec.976
- By:
- Publication type:
- Article
An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 245, doi. 10.1002/sec.977
- By:
- Publication type:
- Article
A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 261, doi. 10.1002/sec.978
- By:
- Publication type:
- Article
Cryptanalysis of a certificateless identification scheme.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 122, doi. 10.1002/sec.963
- By:
- Publication type:
- Article
Enhancement on strongly secure group key agreement.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 126, doi. 10.1002/sec.964
- By:
- Publication type:
- Article
Analyses of several recently proposed group key management schemes.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 136, doi. 10.1002/sec.966
- By:
- Publication type:
- Article
Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 149, doi. 10.1002/sec.967
- By:
- Publication type:
- Article
A high-capacity and low-distortion 3D polygonal mesh steganography using surfacelet transform.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 159, doi. 10.1002/sec.968
- By:
- Publication type:
- Article
A lightweight trust management based on Bayesian and Entropy for wireless sensor networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 168, doi. 10.1002/sec.969
- By:
- Publication type:
- Article
An efficient batch verification system and its effect in a real time VANET environment.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 298, doi. 10.1002/sec.980
- By:
- Publication type:
- Article
Efficient video frame insertion and deletion detection based on inconsistency of correlations between local binary pattern coded frames.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 311, doi. 10.1002/sec.981
- By:
- Publication type:
- Article
On query execution over encrypted data.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 321, doi. 10.1002/sec.982
- By:
- Publication type:
- Article
Issue Information.
- Published in:
- 2015
- Publication type:
- Other
An integrated detection system against false data injection attacks in the Smart Grid.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 91, doi. 10.1002/sec.957
- By:
- Publication type:
- Article