Search Results

There are 305852 results for: content related to: Security challenges in emerging and next-generation wireless communication networks

  1. SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 122–135, Jun Shao, Zhenfu Cao and Peng Liu

    Article first published online : 6 MAY 2009, DOI: 10.1002/sec.109

  2. Identification with encrypted biometric data

    Security and Communication Networks

    Volume 4, Issue 5, May 2011, Pages: 548–562, Julien Bringer, Hervé Chabanne and Bruno Kindarji

    Article first published online : 9 JUN 2010, DOI: 10.1002/sec.206

  3. Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 125–144, Hani Alzaid, Ernest Foo, Juan González Nieto and Ejaz Ahmed

    Article first published online : 8 FEB 2011, DOI: 10.1002/sec.286

  4. A non-associative lattice-based public key cryptosystem

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 145–163, Ehsan Malekian and Ali Zakerolhosseini

    Article first published online : 2 FEB 2011, DOI: 10.1002/sec.297

  5. Robust smart-cards-based user authentication scheme with user anonymity

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 236–248, Shuhua Wu, Yuefei Zhu and Qiong Pu

    Article first published online : 28 APR 2011, DOI: 10.1002/sec.315

  6. A robust user authentication scheme with self-certificates for wireless sensor networks

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 815–824, Huei-Ru Tseng, Rong-Hong Jan and Wuu Yang

    Article first published online : 9 JUN 2010, DOI: 10.1002/sec.212

  7. Performance of the verification for binary memoryless channels

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1212–1225, Vladimir B. Balakirsky and A. J. Han Vinck

    Article first published online : 8 NOV 2010, DOI: 10.1002/sec.263

  8. An efficient and provably secure public key encryption scheme based on coding theory

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1440–1447, Rongxing Lu, Xiaodong Lin, Xiaohui Liang and Xuemin (Sherman) Shen

    Article first published online : 13 DEC 2010, DOI: 10.1002/sec.274

  9. A formal approach to robustness testing of network protocol with time constraints

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 622–632, Xia Yin, Zhiliang Wang, Chuanming Jing and Jianping Wu

    Article first published online : 5 FEB 2010, DOI: 10.1002/sec.193

  10. DSA-Mesh: a distributed security architecture for wireless mesh networks

    Security and Communication Networks

    Volume 4, Issue 3, March 2011, Pages: 242–256, Fabio Martignon, Stefano Paris and Antonio Capone

    Article first published online : 13 JAN 2010, DOI: 10.1002/sec.181

  11. Fusion of visual and infrared face verification systems

    Security and Communication Networks

    Volume 4, Issue 5, May 2011, Pages: 500–514, Byounggyu Choi, Youngsung Kim and Kar-Ann Toh

    Article first published online : 10 JAN 2011, DOI: 10.1002/sec.251

  12. An efficient random key distribution scheme for large-scale distributed sensor networks

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 162–180, Ashok Kumar Das

    Article first published online : 30 JUN 2009, DOI: 10.1002/sec.123

  13. A new biometric identity based encryption scheme secure against DoS attacks

    Security and Communication Networks

    Volume 4, Issue 1, January 2011, Pages: 23–32, Neyire Deniz Sarier

    Article first published online : 9 DEC 2009, DOI: 10.1002/sec.162

  14. Interoperable semantic access control for highly dynamic coalitions

    Security and Communication Networks

    Volume 3, Issue 6, November/December 2010, Pages: 565–594, Hristo Koshutanski and Antonio Maña

    Article first published online : 15 SEP 2009, DOI: 10.1002/sec.148

  15. Secure and robust threshold key management (SRKM) scheme for ad hoc networks

    Security and Communication Networks

    Volume 3, Issue 6, November/December 2010, Pages: 517–534, K. Hamouid and K. Adi

    Article first published online : 17 FEB 2010, DOI: 10.1002/sec.199

  16. Source—destination obfuscation in wireless ad hocnetworks

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 888–901, Thaier Hayajneh, Razvi Doomun, Prashant Krishnamurthy and David Tipper

    Article first published online : 15 JUL 2010, DOI: 10.1002/sec.220

  17. A game theoretic investigation of deception in network security

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1162–1172, Thomas E. Carroll and Daniel Grosu

    Article first published online : 3 DEC 2010, DOI: 10.1002/sec.242

  18. A generic sampling framework for improving anomaly detection in the next generation network

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 919–936, Fazirulhisyam Hashim and Abbas Jamalipour

    Article first published online : 15 NOV 2010, DOI: 10.1002/sec.224

  19. IDOAKE: strongly secure ID-based one-pass authenticated key exchange protocol

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1153–1161, Hai Huang and Zhenfu Cao

    Article first published online : 3 DEC 2010, DOI: 10.1002/sec.241

  20. Authenticated key exchange protocol with enhanced freshness properties

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1130–1136, Hai Huang and Zhenfu Cao

    Article first published online : 28 AUG 2010, DOI: 10.1002/sec.238