Search Results

There are 7442 results for: content related to: A fault recovery-based scheduling algorithm for cloud service reliability

  1. Modeling, conflict detection, and verification of a new virtualization role-based access control framework

    Security and Communication Networks

    Yang Luo, Chunhe Xia, Liangshuang Lv, Zhao Wei and Yazhuo Li

    Article first published online : 23 JUN 2014, DOI: 10.1002/sec.1025

  2. Efficient and fault-diagnosable authentication architecture for AMI in smart grid

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 598–616, Depeng Li, Zeyar Aung, John R. Williams and Abel Sanchez

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1006

  3. Bloom-filter based IP-CHOCK detection scheme for denial of service attacks in VANET

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 864–878, Karan Verma and Halabi Hasbullah

    Article first published online : 2 JUN 2014, DOI: 10.1002/sec.1043

  4. Reversible data hiding exploiting high-correlation regulation for high-quality images

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1408–1421, Xing-Tian Wang, Ming-Chu Li, Szu-Ting Wang and Chin-Chen Chang

    Article first published online : 27 AUG 2014, DOI: 10.1002/sec.1083

  5. Data privacy breach prevention framework for the cloud service

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 982–1005, Chandramohan Dhasarathan, Vengattaraman Thirumal and Dhavachelvan Ponnurangam

    Article first published online : 15 JUN 2014, DOI: 10.1002/sec.1054

  6. Comb: a resilient and efficient two-hop lookup service for distributed communication system

    Security and Communication Networks

    Kai Shuang, Peng Zhang and Sen Su

    Article first published online : 26 JUN 2014, DOI: 10.1002/sec.1031

  7. Balanced double subset difference broadcast encryption scheme

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1447–1460, Shyh-Yih Wang, Wu-Chuan Yang and Ying-Jen Lin

    Article first published online : 5 AUG 2014, DOI: 10.1002/sec.1093

  8. A broker-based cooperative security-SLA evaluation methodology for personal cloud computing

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1318–1331, Sang-Ho Na and Eui-Nam Huh

    Article first published online : 8 AUG 2014, DOI: 10.1002/sec.1086

  9. WEBridge: west–east bridge for distributed heterogeneous SDN NOSes peering

    Security and Communication Networks

    Pingping Lin, Jun Bi and Yangyang Wang

    Article first published online : 4 AUG 2014, DOI: 10.1002/sec.1030

  10. DMAM: distributed mobility and authentication mechanism in next generation networks

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 845–863, Muhammad Zubair, Xiangwei Kong and Saeed Mahfooz

    Article first published online : 22 JUN 2014, DOI: 10.1002/sec.1041

  11. Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1292–1309, Faraz Idris Khan, Taeshik Shon, Taekkyeun Lee and Ki-Hyung Kim

    Article first published online : 13 MAY 2014, DOI: 10.1002/sec.1023

  12. Coloring networks for attacker identification and response

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 751–768, Ashok Singh Sairam, Sangita Roy and Rishikesh Sahay

    Article first published online : 19 JUL 2014, DOI: 10.1002/sec.1022

  13. Secure publish/subscribe-based certificate status validations in mobile ad hoc networks

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1063–1076, Mohammad Masdari, Sam Jabbehdari and Jamshid Bagherzadeh

    Article first published online : 24 AUG 2014, DOI: 10.1002/sec.1062

  14. Trust dynamic task allocation algorithm with Nash equilibrium for heterogeneous wireless sensor network

    Security and Communication Networks

    Wen Zhong Guo, Jia Ye Chen, Guo Long Chen and Hai Feng Zheng

    Article first published online : 7 MAY 2014, DOI: 10.1002/sec.1026

  15. Elliptic-curve scalar multiplication algorithm using ZOT structure

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1141–1154, Hani Almimi, Azman Samsudin and Shahram Jahani

    Article first published online : 15 JUN 2014, DOI: 10.1002/sec.1047

  16. Design of secure access control scheme for personal health record-based cloud healthcare service

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1332–1346, Chia-Hui Liu, Fong-Qi Lin, Chin-Sheng Chen and Tzer-Shyong Chen

    Article first published online : 8 AUG 2014, DOI: 10.1002/sec.1087

  17. AutoMal: automatic clustering and signature generation for malwares based on the network flow

    Security and Communication Networks

    Sun Hao, Wen Wang, Huabiao Lu and Peige Ren

    Article first published online : 29 MAY 2014, DOI: 10.1002/sec.1029

  18. Cooperative monitoring BGP among autonomous systems

    Security and Communication Networks

    Ning Hu, BaoSheng Wang and Xin Liu

    Article first published online : 29 MAY 2014, DOI: 10.1002/sec.1024

  19. E-correlator: an entropy-based alert correlation system

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 822–836, Mohammad GhasemiGol and Abbas Ghaemi-Bafghi

    Article first published online : 18 JUL 2014, DOI: 10.1002/sec.1039

  20. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1378–1407, Rajeev Singh and Teek Parval Sharma

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1079