Found: 49
Select item for more details and to access through your institution.
Data integration using service composition in data service middleware.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2134, doi. 10.1002/sec.925
- By:
- Publication type:
- Article
A study of IP prefix hijacking in cloud computing networks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2201, doi. 10.1002/sec.738
- By:
- Publication type:
- Article
Achieving dynamic privileges in secure data sharing on cloud storage.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2211, doi. 10.1002/sec.739
- By:
- Publication type:
- Article
A combined solution for the Internet access denial caused by malicious Internet service providers.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2078, doi. 10.1002/sec.920
- By:
- Publication type:
- Article
Symmetric key image encryption using chaotic Rossler system.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2145, doi. 10.1002/sec.927
- By:
- Publication type:
- Article
Security risk assessment framework for cloud computing environments.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2114, doi. 10.1002/sec.923
- By:
- Publication type:
- Article
The design of authentication key protocol in certificate-free public key cryptosystem.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2125, doi. 10.1002/sec.924
- By:
- Publication type:
- Article
Simulatable and secure certificate-based threshold signature without pairings.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2094, doi. 10.1002/sec.921
- By:
- Publication type:
- Article
Loss-tolerant authentication with digital signatures.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2054, doi. 10.1002/sec.917
- By:
- Publication type:
- Article
Preserving identity privacy on multi-owner cloud data during public verification.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2104, doi. 10.1002/sec.922
- By:
- Publication type:
- Article
MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1641, doi. 10.1002/sec.861
- By:
- Publication type:
- Article
Distinguishing computer graphics from photographic images using a multiresolution approach based on local binary patterns.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2153, doi. 10.1002/sec.929
- By:
- Publication type:
- Article
Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1746, doi. 10.1002/sec.872
- By:
- Publication type:
- Article
An energy-efficient and security aware route selection protocol for wireless sensor networks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2015, doi. 10.1002/sec.915
- By:
- Publication type:
- Article
Behavior-based botnet detection in parallel.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1849, doi. 10.1002/sec.898
- By:
- Publication type:
- Article
Trust coercion in the name of usable public key infrastructure.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1734, doi. 10.1002/sec.870
- By:
- Publication type:
- Article
Privacy-preserving framework for geosocial applications.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1764, doi. 10.1002/sec.873
- By:
- Publication type:
- Article
Hidden attribute-based signcryption scheme for lattice.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1780, doi. 10.1002/sec.875
- By:
- Publication type:
- Article
Trust and reputation management in cognitive radio networks: a survey.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2160, doi. 10.1002/sec.899
- By:
- Publication type:
- Article
Mechanisms to locate noncooperative transmitters in wireless networks based on residual signal strengths.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1788, doi. 10.1002/sec.877
- By:
- Publication type:
- Article
Issue Information.
- Published in:
- 2014
- Publication type:
- Other
A response selection model for intrusion response systems: Response Strategy Model (RSM).
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1831, doi. 10.1002/sec.896
- By:
- Publication type:
- Article
Metamorphic malware detection using base malware identification approach.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1719, doi. 10.1002/sec.869
- By:
- Publication type:
- Article
FPGA implementation of AES algorithm for high throughput using folded parallel architecture.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2225, doi. 10.1002/sec.651
- By:
- Publication type:
- Article
Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1974, doi. 10.1002/sec.912
- By:
- Publication type:
- Article
A model-driven approach for experimental evaluation of intrusion detection systems.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1955, doi. 10.1002/sec.911
- By:
- Publication type:
- Article
Enterprise security pattern: a new type of security pattern.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1670, doi. 10.1002/sec.863
- By:
- Publication type:
- Article
Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1988, doi. 10.1002/sec.913
- By:
- Publication type:
- Article
Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2003, doi. 10.1002/sec.914
- By:
- Publication type:
- Article
More secure smart card-based remote user password authentication scheme with user anonymity.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2039, doi. 10.1002/sec.916
- By:
- Publication type:
- Article
A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1691, doi. 10.1002/sec.865
- By:
- Publication type:
- Article
Secure socket layer certificate verification: a learning automata approach.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1712, doi. 10.1002/sec.867
- By:
- Publication type:
- Article
A more secure and efficient Andrew Secure RPC protocol.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2063, doi. 10.1002/sec.918
- By:
- Publication type:
- Article
A novel signature based on the combination of global and local signatures for image copy detection.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1702, doi. 10.1002/sec.866
- By:
- Publication type:
- Article
Intrusion-aware trust model for vehicular ad hoc networks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1652, doi. 10.1002/sec.862
- By:
- Publication type:
- Article
Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2185, doi. 10.1002/sec.748
- By:
- Publication type:
- Article
Call for papers: systematic network optimizations for security parameters (security and communication networks).
- Published in:
- 2014
- By:
- Publication type:
- Other
Security and privacy in internet of things: methods, architectures, and solutions.
- Published in:
- 2014
- Publication type:
- Other
Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1805, doi. 10.1002/sec.881
- By:
- Publication type:
- Article
Typing secure implementation of authentication protocols in environments with compromised principals.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1815, doi. 10.1002/sec.882
- By:
- Publication type:
- Article
A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1860, doi. 10.1002/sec.900
- By:
- Publication type:
- Article
Frequent sub-graph mining for intelligent malware detection.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1872, doi. 10.1002/sec.902
- By:
- Publication type:
- Article
Protecting mobile agents communications in pervasive networks with a trusted distributed mediator for ID-based RSA.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1887, doi. 10.1002/sec.903
- By:
- Publication type:
- Article
Surveillance using non-stealthy sensors: A new intruder model.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1900, doi. 10.1002/sec.904
- By:
- Publication type:
- Article
Using fuzzy comprehensive evaluation method to establish a credible spectrum sensing and allocation model.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1912, doi. 10.1002/sec.905
- By:
- Publication type:
- Article
An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1921, doi. 10.1002/sec.906
- By:
- Publication type:
- Article
Privacy-assured substructure similarity query over encrypted graph-structured data in cloud.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1933, doi. 10.1002/sec.907
- By:
- Publication type:
- Article
A novel D-S based secure localization algorithm for wireless sensor networks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1945, doi. 10.1002/sec.909
- By:
- Publication type:
- Article
Special issue on trust and security in cloud computing.
- Published in:
- 2014
- By:
- Publication type:
- Editorial