Search Results

There are 29708 results for: content related to: GlobalView: building global view with log files in a distributed/networked system for accountability

  1. VeriEST: verification via primary user emulation signal-based test for secure distributed spectrum sensing in cognitive radio networks

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 776–788, Mihui Kim, Min Young Chung and Hyunseung Choo

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.372

  2. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 11 MAY 2011, DOI: 10.1002/sec.324

  3. Energy efficiency of encryption schemes applied to wireless sensor networks

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 789–808, Xueying Zhang, Howard M. Heys and Cheng Li

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.375

  4. Identity management-based social trust model for mediating information sharing and privacy enhancement

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 887–897, Mucheol Kim, Jiwan Seo, Sanghyun Noh and Sangyong Han

    Version of Record online : 3 OCT 2011, DOI: 10.1002/sec.379

  5. CSP-DHIES: a new public-key encryption scheme from matrix conjugation

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 809–822, Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li and Yixian Yang

    Version of Record online : 3 OCT 2011, DOI: 10.1002/sec.376

  6. Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 764–775, Yuan Zhou and Haifeng Qian

    Version of Record online : 1 SEP 2011, DOI: 10.1002/sec.371

  7. Secured hierarchical secret sharing using ECC based signcryption

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 752–763, Atanu Basu, Indranil Sengupta and Jamuna Kanta Sing

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.370

  8. Text split-based steganography in OOXML format documents for covert communication

    Security and Communication Networks

    Volume 5, Issue 9, September 2012, Pages: 957–968, Zhangjie Fu, Xingming Sun, Yuling Liu and Bo Li

    Version of Record online : 19 OCT 2011, DOI: 10.1002/sec.378

  9. A proposed security scheme against Denial of Service attacks in cluster-based wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2542–2554, Guangjie Han, Wen Shen, Trung Q. Duong, Mohsen Guizani and Takahiro Hara

    Version of Record online : 9 SEP 2011, DOI: 10.1002/sec.373

  10. Secure and efficient dynamic program update in wireless sensor networks

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 823–830, Daojing He, Sammy Chan, Chun Chen and Jiajun Bu

    Version of Record online : 3 OCT 2011, DOI: 10.1002/sec.377

  11. Accountability using flow-net: design, implementation, and performance evaluation

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 29–49, Yang Xiao, Ke Meng and Daisuke Takahashi

    Version of Record online : 16 JUN 2011, DOI: 10.1002/sec.348

  12. A survey of cyber crimes

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 422–437, Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.331

  13. Virtual flow-net for accountability and forensics of computer and network systems

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2509–2526, Daisuke Takahashi, Yang Xiao and Ke Meng

    Version of Record online : 27 DEC 2011, DOI: 10.1002/sec.407

  14. Security and privacy issues for the network of the future

    Security and Communication Networks

    Volume 5, Issue 9, September 2012, Pages: 987–1005, Giannis F. Marias, João Barros, Markus Fiedler, Andreas Fischer, Harald Hauff, Ralph Herkenhoener, Antonio Grillo, Alessandro Lentini, Luisa Lima, Charlott Lorentzen, Wojciech Mazurczyk, Hermann de Meer, Paulo F. Oliveira, George C. Polyzos, Enric Pujol, Krzysztof Szczypiorski, João P. Vilela and Tiago T. V. Vinhoza

    Version of Record online : 25 OCT 2011, DOI: 10.1002/sec.384

  15. MalPEFinder: fast and retrospective assessment of data breaches in malware attacks

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 899–915, Shun-Te Liu and Yi-Ming Chen

    Version of Record online : 4 NOV 2011, DOI: 10.1002/sec.390

  16. Minimizing insider misuse through secure Identity Management

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 847–862, Ludwig Fuchs and Günther Pernul

    Version of Record online : 25 FEB 2011, DOI: 10.1002/sec.314

  17. A survey of key distribution in wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2495–2508, Chi-Yuan Chen and Han-Chieh Chao

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.354

  18. SYN flooding attack detection by TCP handshake anomalies

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 709–724, Martine Bellaïche and Jean-Charles Grégoire

    Version of Record online : 16 AUG 2011, DOI: 10.1002/sec.365

  19. SIPA: generic and secure accounting for SIP

    Security and Communication Networks

    Volume 5, Issue 9, September 2012, Pages: 1006–1027, Alexandros Tsakountakis, Georgios Kambourakis and Stefanos Gritzalis

    Version of Record online : 26 OCT 2011, DOI: 10.1002/sec.387

  20. Content-based image authentication by feature point clustering and matching

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 636–647, Lei Yang, Jun Tian and Dapeng Wu

    Version of Record online : 23 AUG 2011, DOI: 10.1002/sec.358