Found: 9
Select item for more details and to access through your institution.
SYN flooding attack detection by TCP handshake anomalies.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 7, p. 709, doi. 10.1002/sec.365
- By:
- Publication type:
- Article
A private online system for executing wills based on a secret sharing mechanism.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 7, p. 725, doi. 10.1002/sec.367
- By:
- Publication type:
- Article
Virtual network stacks: from theory to practice.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 7, p. 738, doi. 10.1002/sec.368
- By:
- Publication type:
- Article
Secured hierarchical secret sharing using ECC based signcryption.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 7, p. 752, doi. 10.1002/sec.370
- By:
- Publication type:
- Article
Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 7, p. 764, doi. 10.1002/sec.371
- By:
- Publication type:
- Article
VeriEST: verification via primary user emulation signal-based test for secure distributed spectrum sensing in cognitive radio networks.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 7, p. 776, doi. 10.1002/sec.372
- By:
- Publication type:
- Article
Energy efficiency of encryption schemes applied to wireless sensor networks.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 7, p. 789, doi. 10.1002/sec.375
- By:
- Publication type:
- Article
CSP-DHIES: a new public-key encryption scheme from matrix conjugation.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 7, p. 809, doi. 10.1002/sec.376
- By:
- Publication type:
- Article
Secure and efficient dynamic program update in wireless sensor networks.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 7, p. 823, doi. 10.1002/sec.377
- By:
- Publication type:
- Article