Search Results

There are 14423 results for: content related to: Performance analysis of secure beaconing messages for GeoNetworking

  1. Self-protecting networking using dynamic p-cycle construction within link capacity constraint

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 689–708, Weiyi Zhang, Farah Kandah, Xiaojiang Du and Chonggang Wang

    Article first published online : 23 AUG 2011, DOI: 10.1002/sec.364

  2. On steganography in lost audio packets

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2602–2615, Wojciech Mazurczyk, Józef Lubacz and Krzysztof Szczypiorski

    Article first published online : 25 OCT 2011, DOI: 10.1002/sec.388

  3. VeriEST: verification via primary user emulation signal-based test for secure distributed spectrum sensing in cognitive radio networks

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 776–788, Mihui Kim, Min Young Chung and Hyunseung Choo

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.372

  4. Energy efficiency of encryption schemes applied to wireless sensor networks

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 789–808, Xueying Zhang, Howard M. Heys and Cheng Li

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.375

  5. Toward attack-resistant localization under infrastructure attacks

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 384–403, Jie Yang and Yingying Chen

    Article first published online : 12 MAY 2011, DOI: 10.1002/sec.323

  6. MalPEFinder: fast and retrospective assessment of data breaches in malware attacks

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 899–915, Shun-Te Liu and Yi-Ming Chen

    Article first published online : 4 NOV 2011, DOI: 10.1002/sec.390

  7. Security enhancement of the communication-efficient AUTHMAC_DH protocols

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 674–680, Chao Lv, Maode Ma, Hui Li, Jianfeng Ma and Ben Niu

    Article first published online : 29 SEP 2011, DOI: 10.1002/sec.361

  8. Minimizing insider misuse through secure Identity Management

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 847–862, Ludwig Fuchs and Günther Pernul

    Article first published online : 25 FEB 2011, DOI: 10.1002/sec.314

  9. A survey of key distribution in wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2495–2508, Chi-Yuan Chen and Han-Chieh Chao

    Article first published online : 13 JUL 2011, DOI: 10.1002/sec.354

  10. CSP-DHIES: a new public-key encryption scheme from matrix conjugation

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 809–822, Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li and Yixian Yang

    Article first published online : 3 OCT 2011, DOI: 10.1002/sec.376

  11. Improved RF4CE key agreement approach involving two-phase key distribution for smart-convergence home device

    Security and Communication Networks

    Volume 5, Issue 9, September 2012, Pages: 974–986, Taeshik Shon, James J. (Jong Hyuk) Park and Doo-Soon Park

    Article first published online : 25 OCT 2011, DOI: 10.1002/sec.382

  12. Leakage-probability-constrained secrecy capacity of a fading channel

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 583–593, Zhi Chen, Dapeng Wu, Pingyi Fan and Khaled Ben Letaief

    Article first published online : 2 AUG 2011, DOI: 10.1002/sec.353

  13. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Article first published online : 11 MAY 2011, DOI: 10.1002/sec.324

  14. A security enhanced authentication and key distribution protocol for wireless networks

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 343–352, Chao Lv, Maode Ma, Hui Li, Jianfeng Ma and Ben Niu

    Article first published online : 8 APR 2011, DOI: 10.1002/sec.312

  15. Distributed denial-of-service attack detection scheme-based joint-entropy

    Security and Communication Networks

    Volume 5, Issue 9, September 2012, Pages: 1049–1061, Hamza Rahmani, Nabil Sahli and Farouk Kamoun

    Article first published online : 23 NOV 2011, DOI: 10.1002/sec.392

  16. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.374

  17. Dependability evaluation of integrated circuits at design time against laser fault injection

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 450–461, Huiyun Li and Hai Yuan

    Article first published online : 27 APR 2011, DOI: 10.1002/sec.327

  18. Modelling security message propagation in delay tolerant networks

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 51–58, Zhongtian Jia, Shudong Li, Haipeng Peng, Yixian Yang and Shize Guo

    Article first published online : 10 MAR 2011, DOI: 10.1002/sec.309

  19. Balanced key tree management for multi-privileged groups using (N, T) policy

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 545–555, Muthulakshmi Angamuthu and Anitha Ramalingam

    Article first published online : 25 JUL 2011, DOI: 10.1002/sec.351

  20. A proposed security scheme against Denial of Service attacks in cluster-based wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2542–2554, Guangjie Han, Wen Shen, Trung Q. Duong, Mohsen Guizani and Takahiro Hara

    Article first published online : 9 SEP 2011, DOI: 10.1002/sec.373