Search Results

There are 20334 results for: content related to: On providing sink anonymity for wireless sensor networks

  1. An efficient scheme to handle bursty behavior in secure group communication using binomial key trees

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 1027–1043, R. Aparna and B. B. Amberker

    Version of Record online : 4 OCT 2010, DOI: 10.1002/sec.250

  2. Secrecy coding for the binary symmetric wiretap channel

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 966–978, Yanling Chen and A. J. Han Vinck

    Version of Record online : 8 SEP 2010, DOI: 10.1002/sec.230

  3. Fusion of visual and infrared face verification systems

    Security and Communication Networks

    Volume 4, Issue 5, May 2011, Pages: 500–514, Byounggyu Choi, Youngsung Kim and Kar-Ann Toh

    Version of Record online : 10 JAN 2011, DOI: 10.1002/sec.251

  4. Cryptosystems based on continued fractions

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1199–1211, Ali Kanso

    Version of Record online : 3 DEC 2010, DOI: 10.1002/sec.255

  5. SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 122–135, Jun Shao, Zhenfu Cao and Peng Liu

    Version of Record online : 6 MAY 2009, DOI: 10.1002/sec.109

  6. End-to-end protocol to secure ad hoc networks against wormhole attacks

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 994–1002, Sandhya Khurana and Neelima Gupta

    Version of Record online : 12 JAN 2011, DOI: 10.1002/sec.272

  7. SCN-SI-021 achieving privacy and access control in pervasive computing environments

    Security and Communication Networks

    Volume 9, Issue 2, 25 January 2016, Pages: 94–105, Emmanouil Magkos and Panayiotis Kotzanikolaou

    Version of Record online : 8 FEB 2011, DOI: 10.1002/sec.283

  8. Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 216–238, Suleyman Kondakci and Cemali Dincer

    Version of Record online : 5 JAN 2011, DOI: 10.1002/sec.287

  9. RFID system for public train transportation

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 557–571, Chin-Ling Chen and Mei-Li Chong

    Version of Record online : 5 NOV 2010, DOI: 10.1002/sec.260

  10. Identification with encrypted biometric data

    Security and Communication Networks

    Volume 4, Issue 5, May 2011, Pages: 548–562, Julien Bringer, Hervé Chabanne and Bruno Kindarji

    Version of Record online : 9 JUN 2010, DOI: 10.1002/sec.206

  11. Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 125–144, Hani Alzaid, Ernest Foo, Juan González Nieto and Ejaz Ahmed

    Version of Record online : 8 FEB 2011, DOI: 10.1002/sec.286

  12. A non-associative lattice-based public key cryptosystem

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 145–163, Ehsan Malekian and Ali Zakerolhosseini

    Version of Record online : 2 FEB 2011, DOI: 10.1002/sec.297

  13. Security of the GPT cryptosystem and its applications to cryptography

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 937–946, Haitham Rashwan, Ernst M. Gabidulin and Bahram Honary

    Version of Record online : 22 OCT 2010, DOI: 10.1002/sec.228

  14. An elliptic curve secret sharing key management scheme for mobile ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1405–1419, Hisham Dahshan and James Irvine

    Version of Record online : 10 MAR 2011, DOI: 10.1002/sec.270

  15. A formal separation method of protocols to eliminate parallel attacks in virtual organization

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1461–1468, Hui Zhao, Mingchu Li and Xinxin Fan

    Version of Record online : 4 FEB 2011, DOI: 10.1002/sec.281

  16. A robust user authentication scheme with self-certificates for wireless sensor networks

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 815–824, Huei-Ru Tseng, Rong-Hong Jan and Wuu Yang

    Version of Record online : 9 JUN 2010, DOI: 10.1002/sec.212

  17. Performance of the verification for binary memoryless channels

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1212–1225, Vladimir B. Balakirsky and A. J. Han Vinck

    Version of Record online : 8 NOV 2010, DOI: 10.1002/sec.263

  18. An efficient and provably secure public key encryption scheme based on coding theory

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1440–1447, Rongxing Lu, Xiaodong Lin, Xiaohui Liang and Xuemin (Sherman) Shen

    Version of Record online : 13 DEC 2010, DOI: 10.1002/sec.274

  19. A novel approach to build QKD relaying models

    Security and Communication Networks

    Volume 4, Issue 4, April 2011, Pages: 347–356, Quoc-Cuong Le and Patrick Bellot

    Version of Record online : 25 SEP 2009, DOI: 10.1002/sec.139

  20. An efficient distributed key management scheme for group-signature based anonymous authentication in VANET

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 79–86, Yipin Sun, Zhenqian Feng, Qiaolin Hu and Jinshu Su

    Version of Record online : 10 MAR 2011, DOI: 10.1002/sec.302