Search Results

There are 34135 results for: content related to: Defeat scanning worms in cyber warfare

  1. Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 740–750, Joonsang Baek, Young-ji Byon, Eman Hableel and Mahmoud Al-Qutayri

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1021

  2. Optimal multiuser spread-spectrum data hiding in digital images

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 540–549, Lili Wei, Dimitris A. Pados, Stella N. Batalama, Rose Qingyang Hu and Michael J. Medley

    Version of Record online : 22 NOV 2014, DOI: 10.1002/sec.1001

  3. A new efficient signcryption scheme in the standard model

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 778–789, Zheng Yang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1034

  4. Trust dynamic task allocation algorithm with Nash equilibrium for heterogeneous wireless sensor network

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1865–1877, Wen Zhong Guo, Jia Ye Chen, Guo Long Chen and Hai Feng Zheng

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1026

  5. Detecting stepping stones by abnormal causality probability

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1831–1844, Sheng Wen, Di Wu, Ping Li, Yang Xiang, Wanlei Zhou and Guiyi Wei

    Version of Record online : 23 JUN 2014, DOI: 10.1002/sec.1037

  6. Location-preserved contention-based routing in vehicular ad hoc networks

    Security and Communication Networks

    Volume 9, Issue 9, June 2016, Pages: 886–898, Qing Yang, Alvin Lim, Xiaojun Ruan, Xiao Qin and Dongjin Kim

    Version of Record online : 11 APR 2014, DOI: 10.1002/sec.1008

  7. A connectivity resilient dynamic multi-channel assignment method for VANET

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1855–1864, Tong Zhao, Shanbo Lu, Wei Yan and Xiaoming Li

    Version of Record online : 9 JUN 2014, DOI: 10.1002/sec.1032

  8. Reliability enhancement for CIR-based physical layer authentication

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 661–671, Jiazi Liu, Ahmed Refaey, Xianbin Wang and Helen Tang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1014

  9. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1036

  10. Single authentication through in convergence space using collaborative smart cameras

    Security and Communication Networks

    Volume 9, Issue 6, April 2016, Pages: 561–570, Geon Woo Kim, Jong Wook Han, Deok Gyu Lee and Sang Wook Kim

    Version of Record online : 4 APR 2014, DOI: 10.1002/sec.1007

  11. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.915

  12. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Version of Record online : 20 FEB 2014, DOI: 10.1002/sec.955

  13. Analyses of several recently proposed group key management schemes

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 136–148, Niu Liu, Shaohua Tang, Lingling Xu and Daojing He

    Version of Record online : 5 MAR 2014, DOI: 10.1002/sec.966

  14. An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 245–260, Lili Xu and Fan Wu

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.977

  15. Authenticated key exchange with synchronized state

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2373–2388, Zheng Yang and Fei Guo

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.948

  16. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1698–1716, Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827

  17. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.878

  18. n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 550–564, Zhengan Huang, Shengli Liu and Kefei Chen

    Version of Record online : 4 APR 2014, DOI: 10.1002/sec.1002

  19. PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 418–430, Soumya Maity, Soumya K. Ghosh and Ehab Al-Shaer

    Version of Record online : 4 JUL 2014, DOI: 10.1002/sec.990

  20. On cross-correlation properties of S-boxes and their design using semi-bent functions

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 790–800, Enes Pasalic, Samed Bajrić and Milan Djordjević

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1035