Search Results

There are 8586 results for: content related to: Steganography in IEEE 802.11 OFDM symbols

  1. Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 216–238, Suleyman Kondakci and Cemali Dincer

    Article first published online : 5 JAN 2011, DOI: 10.1002/sec.287

  2. RFID system for public train transportation

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 557–571, Chin-Ling Chen and Mei-Li Chong

    Article first published online : 5 NOV 2010, DOI: 10.1002/sec.260

  3. Secrecy coding for the binary symmetric wiretap channel

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 966–978, Yanling Chen and A. J. Han Vinck

    Article first published online : 8 SEP 2010, DOI: 10.1002/sec.230

  4. Performance of the verification for binary memoryless channels

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1212–1225, Vladimir B. Balakirsky and A. J. Han Vinck

    Article first published online : 8 NOV 2010, DOI: 10.1002/sec.263

  5. MSN: mutual secure neighbor verification in multi-hop wireless networks

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 186–196, Issa M. Khalil, M. Awad, S. Bouktif and F. Awwad

    Article first published online : 2 FEB 2011, DOI: 10.1002/sec.304

  6. Analysis and control stratagems of flash disk virus dynamic propagation model

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 226–235, Cong Jin and Xiao-Yan Wang

    Article first published online : 15 FEB 2011, DOI: 10.1002/sec.310

  7. Modelling security message propagation in delay tolerant networks

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 51–58, Zhongtian Jia, Shudong Li, Haipeng Peng, Yixian Yang and Shize Guo

    Article first published online : 10 MAR 2011, DOI: 10.1002/sec.309

  8. Pitch-based gender identification with two-stage classification

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 211–225, Yakun Hu, Dapeng Wu and Antonio Nucci

    Article first published online : 10 MAR 2011, DOI: 10.1002/sec.308

  9. A non-associative lattice-based public key cryptosystem

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 145–163, Ehsan Malekian and Ali Zakerolhosseini

    Article first published online : 2 FEB 2011, DOI: 10.1002/sec.297

  10. A self-stabilized random access protocol against denial of service attack in wireless networks

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 1075–1087, Jahangir H. Sarker and Hussein T. Mouftah

    Article first published online : 3 DEC 2010, DOI: 10.1002/sec.248

  11. An elliptic curve secret sharing key management scheme for mobile ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1405–1419, Hisham Dahshan and James Irvine

    Article first published online : 10 MAR 2011, DOI: 10.1002/sec.270

  12. Could firewall rules be public – a game theoretical perspective

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 197–210, Qi Liao, Zhen Li and Aaron Striegel

    Article first published online : 24 JAN 2011, DOI: 10.1002/sec.307

  13. An efficient scheme to handle bursty behavior in secure group communication using binomial key trees

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 1027–1043, R. Aparna and B. B. Amberker

    Article first published online : 4 OCT 2010, DOI: 10.1002/sec.250

  14. XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1420–1444, Devrim Unal and M. Ufuk Caglayan

    Article first published online : 27 JAN 2012, DOI: 10.1002/sec.411

  15. Self-protecting networking using dynamic p-cycle construction within link capacity constraint

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 689–708, Weiyi Zhang, Farah Kandah, Xiaojiang Du and Chonggang Wang

    Article first published online : 23 AUG 2011, DOI: 10.1002/sec.364

  16. A security enhanced authentication and key distribution protocol for wireless networks

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 343–352, Chao Lv, Maode Ma, Hui Li, Jianfeng Ma and Ben Niu

    Article first published online : 8 APR 2011, DOI: 10.1002/sec.312

  17. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.374

  18. On steganography in lost audio packets

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2602–2615, Wojciech Mazurczyk, Józef Lubacz and Krzysztof Szczypiorski

    Article first published online : 25 OCT 2011, DOI: 10.1002/sec.388

  19. Cryptosystems based on continued fractions

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1199–1211, Ali Kanso

    Article first published online : 3 DEC 2010, DOI: 10.1002/sec.255

  20. Characterizing the greedy behavior in wireless ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 3, March 2011, Pages: 284–298, Soufiene Djahel, Farid Naït-abdesselam and Damla Turgut

    Article first published online : 3 AUG 2010, DOI: 10.1002/sec.210