Search Results

There are 66754 results for: content related to: Comb: a resilient and efficient two-hop lookup service for distributed communication system

  1. A secure white-box SM4 implementation

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 996–1006, Kunpeng Bai and Chuankun Wu

    Version of Record online : 16 DEC 2015, DOI: 10.1002/sec.1394

  2. A high-capacity and secure least significant bit embedding approach based on word and letter frequencies

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5764–5788, Mohammad H. Alshayeji, Suood Abdulaziz Al-Roomi and Sa'ed Abed

    Version of Record online : 24 JAN 2017, DOI: 10.1002/sec.1735

  3. Design and implementation of a versatile cryptographic unit for RISC processors

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 36–52, Kazim Yumbul, Erkay Savaş, Övünç Kocabaş and Johann Großschädl

    Version of Record online : 10 MAY 2012, DOI: 10.1002/sec.555

  4. Denial-of-service in content centric (named data) networking: a tutorial and state-of-the-art survey

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2037–2059, Muhammad Aamir and Syed Mustafa Ali Zaidi

    Version of Record online : 29 OCT 2014, DOI: 10.1002/sec.1149

  5. Enhancing information lookup privacy through homomorphic encryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2804–2814, N. Fotiou, D. Trossen, G.F. Marias, A. Kostopoulos and G.C. Polyzos

    Version of Record online : 15 NOV 2013, DOI: 10.1002/sec.910

  6. DMAM: distributed mobility and authentication mechanism in next generation networks

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 845–863, Muhammad Zubair, Xiangwei Kong and Saeed Mahfooz

    Version of Record online : 22 JUN 2014, DOI: 10.1002/sec.1041

  7. DDoS attacks on data plane of software-defined network: are they possible?

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5444–5459, Xiaotong Wu, Meng Liu, Wanchun Dou and Shui Yu

    Version of Record online : 9 DEC 2016, DOI: 10.1002/sec.1709

  8. A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 937–951, Wenfang Zhang, Xiaomin Wang and Muhammad Khurram Khan

    Version of Record online : 10 JUN 2014, DOI: 10.1002/sec.1051

  9. VRS: a values-based reputation system for web services

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 6335–6350, Fu-Hau Hsu, Yu-Liang Hsu, Yan-Ling Hwang, Li-Han Chen, Chuan-Sheng Wang, Chang-Kuo Tso, Szu-Chi Liu, Po-Ching Lin and Chi-Hsien Hsu

    Version of Record online : 27 NOV 2016, DOI: 10.1002/sec.1704

  10. Software-defined networking (SDN): a survey

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5803–5833, Kamal Benzekki, Abdeslam El Fergougui and Abdelbaki Elbelrhiti Elalaoui

    Version of Record online : 7 FEB 2017, DOI: 10.1002/sec.1737

  11. Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 740–750, Joonsang Baek, Young-ji Byon, Eman Hableel and Mahmoud Al-Qutayri

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1021

  12. Modeling, conflict detection, and verification of a new virtualization role-based access control framework

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1904–1925, Yang Luo, Chunhe Xia, Liangshuang Lv, Zhao Wei and Yazhuo Li

    Version of Record online : 23 JUN 2014, DOI: 10.1002/sec.1025

  13. Elliptic-curve scalar multiplication algorithm using ZOT structure

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1141–1154, Hani Almimi, Azman Samsudin and Shahram Jahani

    Version of Record online : 15 JUN 2014, DOI: 10.1002/sec.1047

  14. Multi-use unidirectional lattice-based proxy re-signatures in standard model

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5615–5624, Jia Xie, Yu-pu Hu and Jun-tao Gao

    Version of Record online : 7 FEB 2017, DOI: 10.1002/sec.1721

  15. Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 6111–6136, Hamed Orojloo and Mohammad Abdollahi Azgomi

    Version of Record online : 3 FEB 2017, DOI: 10.1002/sec.1761

  16. Anomaly detection and response approach based on mapping requests

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2277–2292, Ming Wan, Hong-Ke Zhang, Tin-Yu Wu and Chi-Hsiang Lo

    Version of Record online : 10 JAN 2014, DOI: 10.1002/sec.937

  17. Hierarchical attribute-based encryption with continuous auxiliary inputs leakage

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 4852–4862, Yuyan Guo, Jiguo Li, Yichen Zhang and Jian Shen

    Version of Record online : 15 DEC 2016, DOI: 10.1002/sec.1659

  18. Intelligent network security assessment with modeling and analysis of attack patterns

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1471–1486, Suleyman Kondakci

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.591

  19. Evaluating and selecting the biometrics in network security

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 727–739, Che-Hung Liu, Jen-Sheng Wang, Chih-Chiang Peng and Joseph Z. Shyu

    Version of Record online : 3 JUL 2014, DOI: 10.1002/sec.1020

  20. Efficient and fault-diagnosable authentication architecture for AMI in smart grid

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 598–616, Depeng Li, Zeyar Aung, John R. Williams and Abel Sanchez

    Version of Record online : 4 APR 2014, DOI: 10.1002/sec.1006