Found: 15
Select item for more details and to access through your institution.
Issue Information.
- Published in:
- 2015
- Publication type:
- Other
A fault recovery-based scheduling algorithm for cloud service reliability.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 703, doi. 10.1002/sec.1017
- By:
- Publication type:
- Article
Defeat scanning worms in cyber warfare.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 715, doi. 10.1002/sec.1019
- By:
- Publication type:
- Article
Evaluating and selecting the biometrics in network security.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 727, doi. 10.1002/sec.1020
- By:
- Publication type:
- Article
Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 740, doi. 10.1002/sec.1021
- By:
- Publication type:
- Article
Coloring networks for attacker identification and response.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 751, doi. 10.1002/sec.1022
- By:
- Publication type:
- Article
Mahalanobis distance similarity measure based distinguisher for template attack.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 769, doi. 10.1002/sec.1033
- By:
- Publication type:
- Article
A new efficient signcryption scheme in the standard model.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 778, doi. 10.1002/sec.1034
- By:
- Publication type:
- Article
On cross-correlation properties of S-boxes and their design using semi-bent functions.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 790, doi. 10.1002/sec.1035
- By:
- Publication type:
- Article
A new certificateless signature scheme under enhanced security models.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 801, doi. 10.1002/sec.1036
- By:
- Publication type:
- Article
Attribute-based signature for threshold predicates from lattices.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 811, doi. 10.1002/sec.1038
- By:
- Publication type:
- Article
E-correlator: an entropy-based alert correlation system.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 822, doi. 10.1002/sec.1039
- By:
- Publication type:
- Article
Evaluation of entropy-based detection of outbound denial-of-service attacks in edge networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 837, doi. 10.1002/sec.1040
- By:
- Publication type:
- Article
DMAM: distributed mobility and authentication mechanism in next generation networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 845, doi. 10.1002/sec.1041
- By:
- Publication type:
- Article
Bloom-filter based IP-CHOCK detection scheme for denial of service attacks in VANET.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 5, p. 864, doi. 10.1002/sec.1043
- By:
- Publication type:
- Article