Search Results

There are 8945 results for: content related to: Location-preserved contention-based routing in vehicular ad hoc networks

  1. Mobile cloud computing based privacy protection in location-based information survey applications

    Security and Communication Networks

    Hao Zhang, Nenghai Yu and Yonggang Wen

    Article first published online : 18 JUL 2014, DOI: 10.1002/sec.1055

  2. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Abdelouahid Derhab and Abdelghani Bouras

    Article first published online : 8 JUL 2014, DOI: 10.1002/sec.1074

  3. Trust dynamic task allocation algorithm with Nash equilibrium for heterogeneous wireless sensor network

    Security and Communication Networks

    Wen Zhong Guo, Jia Ye Chen, Guo Long Chen and Hai Feng Zheng

    Article first published online : 7 MAY 2014, DOI: 10.1002/sec.1026

  4. DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS

    Security and Communication Networks

    Xiuxia Tian, Ling Huang, Yong Wang, Chaofeng Sha and Xiaoling Wang

    Article first published online : 9 SEP 2014, DOI: 10.1002/sec.1098

  5. A nonmonotonic modal authorization logic for pervasive computing

    Security and Communication Networks

    Ali Noorollahi and Mehran S. Fallah

    Article first published online : 8 JUL 2014, DOI: 10.1002/sec.1063

  6. Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid

    Security and Communication Networks

    Rong Jiang, Rongxing Lu, Jun Luo, Chengzhe Lai and Xuemin (Sherman) Shen

    Article first published online : 22 AUG 2014, DOI: 10.1002/sec.1057

  7. Reliability enhancement for CIR-based physical layer authentication

    Security and Communication Networks

    Jiazi Liu, Ahmed Refaey, Xianbin Wang and Helen Tang

    Article first published online : 7 MAY 2014, DOI: 10.1002/sec.1014

  8. Detecting stepping stones by abnormal causality probability

    Security and Communication Networks

    Sheng Wen, Di Wu, Ping Li, Yang Xiang, Wanlei Zhou and Guiyi Wei

    Article first published online : 23 JUN 2014, DOI: 10.1002/sec.1037

  9. A connectivity resilient dynamic multi-channel assignment method for VANET

    Security and Communication Networks

    Tong Zhao, Shanbo Lu, Wei Yan and Xiaoming Li

    Article first published online : 9 JUN 2014, DOI: 10.1002/sec.1032

  10. n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Zhengan Huang, Shengli Liu and Kefei Chen

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1002

  11. Residual energy-based replica detection scheme for mobile wireless sensor networks

    Security and Communication Networks

    Alekha Kumar Mishra and Ashok Kumar Turuk

    Article first published online : 3 APR 2014, DOI: 10.1002/sec.1012

  12. Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature

    Security and Communication Networks

    Joonsang Baek, Young-ji Byon, Eman Hableel and Mahmoud Al-Qutayri

    Article first published online : 7 MAY 2014, DOI: 10.1002/sec.1021

  13. Protect biometric data with compound chaotic encryption

    Security and Communication Networks

    Charles Z. Liew, Raymond Shaw and Lanlan Li

    Article first published online : 15 AUG 2014, DOI: 10.1002/sec.1070

  14. ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks

    Security and Communication Networks

    Le Chen, Rongxing Lu, Khalid AlHarbi, Xiaodong Lin and Zhenfu Cao

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1082

  15. Proxy signcryption scheme in the standard model

    Security and Communication Networks

    Yang Ming and Yumin Wang

    Article first published online : 2 SEP 2014, DOI: 10.1002/sec.1092

  16. An efficient strongly secure authenticated key exchange protocol without random oracles

    Security and Communication Networks

    Zheng Yang

    Article first published online : 28 AUG 2014, DOI: 10.1002/sec.1095

  17. Single authentication through in convergence space using collaborative smart cameras

    Security and Communication Networks

    Geon Woo Kim, Jong Wook Han, Deok Gyu Lee and Sang Wook Kim

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1007

  18. DMAM: distributed mobility and authentication mechanism in next generation networks

    Security and Communication Networks

    Muhammad Zubair, Xiangwei Kong and Saeed Mahfooz

    Article first published online : 22 JUN 2014, DOI: 10.1002/sec.1041

  19. A practical strongly secure one-round authenticated key exchange protocol without random oracles

    Security and Communication Networks

    Zheng Yang and Wu Yang

    Article first published online : 9 SEP 2014, DOI: 10.1002/sec.1067

  20. On cross-correlation properties of S-boxes and their design using semi-bent functions

    Security and Communication Networks

    Enes Pasalic, Samed Bajrić and Milan Djordjević

    Article first published online : 26 MAY 2014, DOI: 10.1002/sec.1035