Found: 22
Select item for more details and to access through your institution.
Issue Information.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. i, doi. 10.1002/sec.884
- Publication type:
- Article
TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 245, doi. 10.1002/sec.725
- By:
- Publication type:
- Article
SRC: a multicore NPU-based TCP stream reassembly card for deep packet inspection.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 265, doi. 10.1002/sec.727
- By:
- Publication type:
- Article
Efficient and secure chaotic S-Box for wireless sensor network.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 279, doi. 10.1002/sec.728
- By:
- Publication type:
- Article
Critical analysis of counter mode with cipher block chain message authentication mode protocol-CCMP.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 293, doi. 10.1002/sec.733
- By:
- Publication type:
- Article
A novel path-based approach for single-packet IP traceback.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 309, doi. 10.1002/sec.741
- By:
- Publication type:
- Article
Security of e-systems.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 322, doi. 10.1002/sec.897
- By:
- Publication type:
- Article
A hybrid NFC-Bluetooth secure protocol for Credit Transfer among mobile phones.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 325, doi. 10.1002/sec.732
- By:
- Publication type:
- Article
Characterization of attacks collected from the deployment of Web service honeypot.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 338, doi. 10.1002/sec.737
- By:
- Publication type:
- Article
An exemplar-based learning approach for detection and classification of malicious network streams in honeynets.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 352, doi. 10.1002/sec.724
- By:
- Publication type:
- Article
A low-cost UHF RFID tag chip with AES cryptography engine.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 365, doi. 10.1002/sec.723
- By:
- Publication type:
- Article
A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 376, doi. 10.1002/sec.731
- By:
- Publication type:
- Article
Dynamic combination of authentication factors based on quantified risk and benefit.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 385, doi. 10.1002/sec.729
- By:
- Publication type:
- Article
Special issue on applied cryptography for information and communication networks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 397, doi. 10.1002/sec.874
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of 'An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems'.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 399, doi. 10.1002/sec.791
- By:
- Publication type:
- Article
Publishing and sharing encrypted data with potential friends in online social networks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 409, doi. 10.1002/sec.806
- By:
- Publication type:
- Article
Signer-admissible strong designated verifier signature from bilinear pairings.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 422, doi. 10.1002/sec.805
- By:
- Publication type:
- Article
A generic homomorphic MAC construction for authentication in network coding.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 429, doi. 10.1002/sec.847
- By:
- Publication type:
- Article
Secure universal designated verifier identity-based signcryption.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 434, doi. 10.1002/sec.820
- By:
- Publication type:
- Article
Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 445, doi. 10.1002/sec.826
- By:
- Publication type:
- Article
A local joint fast handoff scheme in cognitive wireless mesh networks.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 455, doi. 10.1002/sec.832
- By:
- Publication type:
- Article
Efficient public key encryption with revocable keyword search.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 466, doi. 10.1002/sec.790
- By:
- Publication type:
- Article