Found: 111
Select item for more details and to access through your institution.
A survey on security vulnerabilities in channel assignment algorithms of multi-interface wireless mesh networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5219, doi. 10.1002/sec.1691
- By:
- Publication type:
- Article
A novel zero-watermarking approach of medical images based on Jacobian matrix model.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5203, doi. 10.1002/sec.1690
- By:
- Publication type:
- Article
ANU: an ultra lightweight cipher design for security in IoT.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5238, doi. 10.1002/sec.1692
- By:
- Publication type:
- Article
Generalisations of NTRU cryptosystem.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 6315, doi. 10.1002/sec.1693
- By:
- Publication type:
- Article
Efficient ring signature schemes over NTRU Lattices.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5252, doi. 10.1002/sec.1694
- By:
- Publication type:
- Article
Identity-based schemes for a secured big data and cloud ICT framework in smart grid system.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5262, doi. 10.1002/sec.1695
- By:
- Publication type:
- Article
Towards a complete chaotic map-based mobile RFID authentication protocol with efficient anticollision tag indexing.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5278, doi. 10.1002/sec.1696
- By:
- Publication type:
- Article
Reputation trust mechanism under the organizational-based access control model.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5295, doi. 10.1002/sec.1698
- By:
- Publication type:
- Article
The performance cost of preserving data/query privacy using searchable symmetric encryption.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5311, doi. 10.1002/sec.1699
- By:
- Publication type:
- Article
Crucial pitfall of DPA Contest V4.2 implementation.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 6094, doi. 10.1002/sec.1760
- By:
- Publication type:
- Article
Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 6111, doi. 10.1002/sec.1761
- By:
- Publication type:
- Article
A generalised wavelet packet-based anonymisation approach for ECG security application.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 6137, doi. 10.1002/sec.1762
- By:
- Publication type:
- Article
Invariant digital image watermarking based on Defragmented Delaunay Triangulation for optimal watermark synchronization.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 6148, doi. 10.1002/sec.1763
- By:
- Publication type:
- Article
Authenticated encryption: how reordering can impact performance.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 6173, doi. 10.1002/sec.1764
- By:
- Publication type:
- Article
Trust aware cooperative routing method for WANETs.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 6189, doi. 10.1002/sec.1765
- By:
- Publication type:
- Article
Strong designated verifier signature scheme from lattices in the standard model.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 6202, doi. 10.1002/sec.1766
- By:
- Publication type:
- Article
Anatomy of targeted attacks with smart malware.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 6215, doi. 10.1002/sec.1767
- By:
- Publication type:
- Article
Publicly verifiable secret sharing scheme and its application with almost optimal information rate.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 6227, doi. 10.1002/sec.1768
- By:
- Publication type:
- Article
Enhanced stego block chaining (ESBC) for low bandwidth channels.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 6239, doi. 10.1002/sec.1769
- By:
- Publication type:
- Article
Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5460, doi. 10.1002/sec.1710
- By:
- Publication type:
- Article
A novel extreme learning machine-based cryptography system.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5472, doi. 10.1002/sec.1711
- By:
- Publication type:
- Article
CDAI: a novel collaborative detection approach for impersonation attacks in vehicular ad-hoc networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5547, doi. 10.1002/sec.1716
- By:
- Publication type:
- Article
MREA: a minimum resource expenditure node capture attack in wireless sensor networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5502, doi. 10.1002/sec.1713
- By:
- Publication type:
- Article
Authentication of spatio-textual similarity join queries in untrusted cloud environments.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5518, doi. 10.1002/sec.1714
- By:
- Publication type:
- Article
Indefinite block ciphering based on variable and great length key.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5533, doi. 10.1002/sec.1715
- By:
- Publication type:
- Article
Short lattice signatures with constant-size public keys.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5490, doi. 10.1002/sec.1712
- By:
- Publication type:
- Article
Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5563, doi. 10.1002/sec.1717
- By:
- Publication type:
- Article
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 4897, doi. 10.1002/sec.1663
- By:
- Publication type:
- Article
Security of VoIP traffic over low or limited bandwidth networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5591, doi. 10.1002/sec.1719
- By:
- Publication type:
- Article
False alarm reduction in signature-based IDS: game theory approach.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 4863, doi. 10.1002/sec.1661
- By:
- Publication type:
- Article
A statistical model for DPA when algorithmic noise is dependent on target.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 4882, doi. 10.1002/sec.1662
- By:
- Publication type:
- Article
An authenticated encryption based grouping proof protocol for RFID systems.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5581, doi. 10.1002/sec.1718
- By:
- Publication type:
- Article
Upgrade of a quantum scheme for authentication and key distribution along with a formal verification based on model checking technique.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 4949, doi. 10.1002/sec.1666
- By:
- Publication type:
- Article
Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 4924, doi. 10.1002/sec.1665
- By:
- Publication type:
- Article
A high-capacity and secure least significant bit embedding approach based on word and letter frequencies.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5764, doi. 10.1002/sec.1735
- By:
- Publication type:
- Article
Software-defined networking (SDN): a survey.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5803, doi. 10.1002/sec.1737
- By:
- Publication type:
- Article
Threshold attribute-based signcryption and its application to authenticated key agreement.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 4914, doi. 10.1002/sec.1664
- By:
- Publication type:
- Article
Some properties of impossible differential and zero correlation linear cryptanalysis on TEA family-type ciphers.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5746, doi. 10.1002/sec.1733
- By:
- Publication type:
- Article
A novel membership cloud model-based trust evaluation model for vehicular ad hoc network of T-CPS.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5710, doi. 10.1002/sec.1730
- By:
- Publication type:
- Article
A face template protection approach using chaos and GRP permutation.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 4957, doi. 10.1002/sec.1667
- By:
- Publication type:
- Article
Ideal social secret sharing using Birkhoff interpolation method.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 4973, doi. 10.1002/sec.1668
- By:
- Publication type:
- Article
Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5143, doi. 10.1002/sec.1684
- By:
- Publication type:
- Article
A certificate-based proxy signature with message recovery without bilinear pairing.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 4983, doi. 10.1002/sec.1669
- By:
- Publication type:
- Article
An efficient designated verifier signature scheme with pairing-free and low cost.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5724, doi. 10.1002/sec.1731
- By:
- Publication type:
- Article
An image edge based approach for image password encryption.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5733, doi. 10.1002/sec.1732
- By:
- Publication type:
- Article
Design a fast Non-Technical Loss fraud detector for smart grid.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5116, doi. 10.1002/sec.1682
- By:
- Publication type:
- Article
Power allocation design and optimization for secure transmission in cognitive relay networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5133, doi. 10.1002/sec.1683
- By:
- Publication type:
- Article
Content-adaptive steganalysis for color images.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5756, doi. 10.1002/sec.1734
- By:
- Publication type:
- Article
A smart fuzzing method for detecting heap-based vulnerabilities in executable codes.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5098, doi. 10.1002/sec.1681
- By:
- Publication type:
- Article
New application of partitioning methodology: identity-based dual receiver encryption.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5789, doi. 10.1002/sec.1736
- By:
- Publication type:
- Article