Search Results

There are 12361 results for: content related to: Location-preserved contention-based routing in vehicular ad hoc networks

  1. Intrusion-aware trust model for vehicular ad hoc networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1652–1669, Riaz Ahmed Shaikh and Ahmed Saeed Alzahrani

    Version of Record online : 19 AUG 2013, DOI: 10.1002/sec.862

  2. A secure cluster-based architecture for certificates management in vehicular networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 665–683, Tahani Gazdar, Abderrahim Benslimane, Abdelfettah Belghith and Abderrezak Rachedi

    Version of Record online : 25 APR 2013, DOI: 10.1002/sec.772

  3. A connectivity resilient dynamic multi-channel assignment method for VANET

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1855–1864, Tong Zhao, Shanbo Lu, Wei Yan and Xiaoming Li

    Version of Record online : 9 JUN 2014, DOI: 10.1002/sec.1032

  4. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.328

  5. A nonmonotonic modal authorization logic for pervasive computing

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1077–1091, Ali Noorollahi and Mehran S. Fallah

    Version of Record online : 8 JUL 2014, DOI: 10.1002/sec.1063

  6. Attribute-based signature for threshold predicates from lattices

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 811–821, Qingbin Wang and Shaozhen Chen

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1038

  7. A short and highly efficient identity-based designated verifier proxy signature scheme

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 907–916, Xiaoming Hu, Jian Wang, Huajie Xu and Wenan Tan

    Version of Record online : 15 JUN 2014, DOI: 10.1002/sec.1048

  8. Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 740–750, Joonsang Baek, Young-ji Byon, Eman Hableel and Mahmoud Al-Qutayri

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1021

  9. Reliability enhancement for CIR-based physical layer authentication

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 661–671, Jiazi Liu, Ahmed Refaey, Xianbin Wang and Helen Tang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1014

  10. An efficient batch verification system and its effect in a real time VANET environment

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 298–310, Jiageng Chen, Mohammad Saiful Islam Mamun and Atsuko Miyaji

    Version of Record online : 18 MAR 2014, DOI: 10.1002/sec.980

  11. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1036

  12. A dynamic key management scheme for dynamic wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1040–1049, Seyed Hossein Erfani, Hamid H.S. Javadi and Amir Masoud Rahmani

    Version of Record online : 10 JUN 2014, DOI: 10.1002/sec.1058

  13. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.878

  14. Delay analysis in practical wireless network coding

    Wireless Communications and Mobile Computing

    Volume 14, Issue 5, 10 April 2014, Pages: 497–515, Huanzhong Li, Xue Liu, Wenbo He, Wei Yang and Wenhua Dou

    Version of Record online : 22 FEB 2012, DOI: 10.1002/wcm.2193

  15. A privacy-preserving distance-based incentive scheme in opportunistic VANETs

    Security and Communication Networks

    Jun Song, ChunJiao He, Fan Yang and HuanGuo Zhang

    Version of Record online : 25 MAR 2015, DOI: 10.1002/sec.1211

  16. A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3271–3281, Khaled Rabieh, Mohamed M. E. A. Mahmoud, Marianne Azer and Mahmoud Allam

    Version of Record online : 8 APR 2015, DOI: 10.1002/sec.1251

  17. n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 550–564, Zhengan Huang, Shengli Liu and Kefei Chen

    Version of Record online : 4 APR 2014, DOI: 10.1002/sec.1002

  18. On cross-correlation properties of S-boxes and their design using semi-bent functions

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 790–800, Enes Pasalic, Samed Bajrić and Milan Djordjević

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1035

  19. Privacy-preserving authentication protocols with efficient verification in VANETs

    International Journal of Communication Systems

    Volume 27, Issue 12, December 2014, Pages: 3676–3692, Jianhong Zhang and Yuwei Xu

    Version of Record online : 24 JUN 2013, DOI: 10.1002/dac.2566

  20. Optimal multiuser spread-spectrum data hiding in digital images

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 540–549, Lili Wei, Dimitris A. Pados, Stella N. Batalama, Rose Qingyang Hu and Michael J. Medley

    Version of Record online : 22 NOV 2014, DOI: 10.1002/sec.1001