Search Results

There are 13996 results for: content related to: Synthesis of attack actions using model checking for the verification of security protocols

  1. SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 122–135, Jun Shao, Zhenfu Cao and Peng Liu

    Article first published online : 6 MAY 2009, DOI: 10.1002/sec.109

  2. Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 216–238, Suleyman Kondakci and Cemali Dincer

    Article first published online : 5 JAN 2011, DOI: 10.1002/sec.287

  3. RFID system for public train transportation

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 557–571, Chin-Ling Chen and Mei-Li Chong

    Article first published online : 5 NOV 2010, DOI: 10.1002/sec.260

  4. Secrecy coding for the binary symmetric wiretap channel

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 966–978, Yanling Chen and A. J. Han Vinck

    Article first published online : 8 SEP 2010, DOI: 10.1002/sec.230

  5. Performance of the verification for binary memoryless channels

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1212–1225, Vladimir B. Balakirsky and A. J. Han Vinck

    Article first published online : 8 NOV 2010, DOI: 10.1002/sec.263

  6. Protocol oblivious classification of multimedia traffic

    Security and Communication Networks

    Volume 4, Issue 4, April 2011, Pages: 357–371, Jieyan Fan, Dapeng Wu, Antonio Nucci, Ram Keralapura and Lixin Gao

    Article first published online : 2 NOV 2009, DOI: 10.1002/sec.154

  7. Two-stage selective sampling for anomaly detection: analysis and evaluation

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 608–621, Georgios Androulidakis and Symeon Papavassiliou

    Article first published online : 7 MAY 2010, DOI: 10.1002/sec.191

  8. A novel approach to build QKD relaying models

    Security and Communication Networks

    Volume 4, Issue 4, April 2011, Pages: 347–356, Quoc-Cuong Le and Patrick Bellot

    Article first published online : 25 SEP 2009, DOI: 10.1002/sec.139

  9. An elliptic curve secret sharing key management scheme for mobile ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1405–1419, Hisham Dahshan and James Irvine

    Article first published online : 10 MAR 2011, DOI: 10.1002/sec.270

  10. An efficient random key distribution scheme for large-scale distributed sensor networks

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 162–180, Ashok Kumar Das

    Article first published online : 30 JUN 2009, DOI: 10.1002/sec.123

  11. Secure and robust threshold key management (SRKM) scheme for ad hoc networks

    Security and Communication Networks

    Volume 3, Issue 6, November/December 2010, Pages: 517–534, K. Hamouid and K. Adi

    Article first published online : 17 FEB 2010, DOI: 10.1002/sec.199

  12. Real-time support for HCCA function in IEEE 802.11e networks: a performance evaluation

    Security and Communication Networks

    Volume 4, Issue 3, March 2011, Pages: 299–315, Gabriele Cecchetti and Anna Lina Ruscelli

    Article first published online : 13 JAN 2010, DOI: 10.1002/sec.182

  13. Cryptosystems based on continued fractions

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1199–1211, Ali Kanso

    Article first published online : 3 DEC 2010, DOI: 10.1002/sec.255

  14. A non-associative lattice-based public key cryptosystem

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 145–163, Ehsan Malekian and Ali Zakerolhosseini

    Article first published online : 2 FEB 2011, DOI: 10.1002/sec.297

  15. A secure cryptosystem based on affine transformation

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 207–215, Mohsen Toorani and Abolfazl Falahati

    Article first published online : 14 SEP 2009, DOI: 10.1002/sec.137

  16. Interoperable semantic access control for highly dynamic coalitions

    Security and Communication Networks

    Volume 3, Issue 6, November/December 2010, Pages: 565–594, Hristo Koshutanski and Antonio Maña

    Article first published online : 15 SEP 2009, DOI: 10.1002/sec.148

  17. Enhancing identity trust in cryptographic key management systems for dynamic environments

    Security and Communication Networks

    Volume 4, Issue 1, January 2011, Pages: 79–94, Anne V. D. M. Kayem, Patrick Martin and Selim G. Akl

    Article first published online : 15 JAN 2010, DOI: 10.1002/sec.164

  18. Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 125–144, Hani Alzaid, Ernest Foo, Juan González Nieto and Ejaz Ahmed

    Article first published online : 8 FEB 2011, DOI: 10.1002/sec.286

  19. A formal model of trust for calculating the quality of X.509 certificate

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 651–665, Wazan Ahmad Samer, Laborde Romain, Barrere Francois and Benzekri AbdelMalek

    Article first published online : 5 MAY 2010, DOI: 10.1002/sec.198

  20. Attacks on a lightweight cipher based on a multiple recursive generator

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 601–607, Lu Xiao and Gregory G. Rose

    Article first published online : 25 JAN 2010, DOI: 10.1002/sec.189