Search Results

There are 10082 results for: content related to: Single authentication through in convergence space using collaborative smart cameras

  1. Detecting stepping stones by abnormal causality probability

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1831–1844, Sheng Wen, Di Wu, Ping Li, Yang Xiang, Wanlei Zhou and Guiyi Wei

    Article first published online : 23 JUN 2014, DOI: 10.1002/sec.1037

  2. Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1026–1039, Rong Jiang, Rongxing Lu, Jun Luo, Chengzhe Lai and Xuemin (Sherman) Shen

    Article first published online : 22 AUG 2014, DOI: 10.1002/sec.1057

  3. Trust dynamic task allocation algorithm with Nash equilibrium for heterogeneous wireless sensor network

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1865–1877, Wen Zhong Guo, Jia Ye Chen, Guo Long Chen and Hai Feng Zheng

    Article first published online : 7 MAY 2014, DOI: 10.1002/sec.1026

  4. DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1494–1508, Xiuxia Tian, Ling Huang, Yong Wang, Chaofeng Sha and Xiaoling Wang

    Article first published online : 9 SEP 2014, DOI: 10.1002/sec.1098

  5. ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1291–1305, Le Chen, Rongxing Lu, Khalid AlHarbi, Xiaodong Lin and Zhenfu Cao

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1082

  6. Optimal multiuser spread-spectrum data hiding in digital images

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 540–549, Lili Wei, Dimitris A. Pados, Stella N. Batalama, Rose Qingyang Hu and Michael J. Medley

    Article first published online : 22 NOV 2014, DOI: 10.1002/sec.1001

  7. Residual energy-based replica detection scheme for mobile wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 637–648, Alekha Kumar Mishra and Ashok Kumar Turuk

    Article first published online : 3 APR 2014, DOI: 10.1002/sec.1012

  8. A nonmonotonic modal authorization logic for pervasive computing

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1077–1091, Ali Noorollahi and Mehran S. Fallah

    Article first published online : 8 JUL 2014, DOI: 10.1002/sec.1063

  9. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1193–1212, Abdelouahid Derhab and Abdelghani Bouras

    Article first published online : 8 JUL 2014, DOI: 10.1002/sec.1074

  10. Location-preserved contention-based routing in vehicular ad hoc networks

    Security and Communication Networks

    Qing Yang, Alvin Lim, Xiaojun Ruan, Xiao Qin and Dongjin Kim

    Article first published online : 11 APR 2014, DOI: 10.1002/sec.1008

  11. Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 740–750, Joonsang Baek, Young-ji Byon, Eman Hableel and Mahmoud Al-Qutayri

    Article first published online : 7 MAY 2014, DOI: 10.1002/sec.1021

  12. A connectivity resilient dynamic multi-channel assignment method for VANET

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1855–1864, Tong Zhao, Shanbo Lu, Wei Yan and Xiaoming Li

    Article first published online : 9 JUN 2014, DOI: 10.1002/sec.1032

  13. Reliability enhancement for CIR-based physical layer authentication

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 661–671, Jiazi Liu, Ahmed Refaey, Xianbin Wang and Helen Tang

    Article first published online : 7 MAY 2014, DOI: 10.1002/sec.1014

  14. n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 550–564, Zhengan Huang, Shengli Liu and Kefei Chen

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1002

  15. Privacy-assured substructure similarity query over encrypted graph-structured data in cloud

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1933–1944, Yingguang Zhang, Sen Su, Yulong Wang, Weifeng Chen and Fangchun Yang

    Article first published online : 18 NOV 2013, DOI: 10.1002/sec.907

  16. Coloring networks for attacker identification and response

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 751–768, Ashok Singh Sairam, Sangita Roy and Rishikesh Sahay

    Article first published online : 19 JUL 2014, DOI: 10.1002/sec.1022

  17. A dependable storage service system in cloud environment

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 574–588, Chin-Chen Chang, Chin-Yu Sun and Ting-Fang Cheng

    Article first published online : 28 MAR 2014, DOI: 10.1002/sec.1004

  18. Defeat scanning worms in cyber warfare

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 715–726, Fu-Hau Hsu, Li-Han Chen and Chia-Jun Lin

    Article first published online : 10 JUN 2014, DOI: 10.1002/sec.1019

  19. Modified data encryption standard encryption algorithm with improved error performance and enhanced security in wireless fading channels

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 565–573, Walid Y. Zibideh and Mustafa M. Matalgah

    Article first published online : 5 MAY 2014, DOI: 10.1002/sec.1003

  20. Modeling, conflict detection, and verification of a new virtualization role-based access control framework

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1904–1925, Yang Luo, Chunhe Xia, Liangshuang Lv, Zhao Wei and Yazhuo Li

    Article first published online : 23 JUN 2014, DOI: 10.1002/sec.1025