Search Results

There are 7509 results for: content related to: Assessing the security of internet-connected critical infrastructures

  1. Modelling of Internet of Things units for estimating security-energy-performance relationships for quality of service and environment awareness

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3324–3339, Algimantas Venckauskas, Vytautas Stuikys, Robertas Damasevicius and Nerijus Jusas

    Version of Record online : 27 JUN 2016, DOI: 10.1002/sec.1537

  2. Privacy in the Internet of Things: threats and challenges

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2728–2742, Jan Henrik Ziegeldorf, Oscar Garcia Morchon and Klaus Wehrle

    Version of Record online : 10 JUN 2013, DOI: 10.1002/sec.795

  3. Secure Communication with RFID tags in the Internet of Things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2639–2653, Sandra Dominikus and Stefan Kraxberger

    Version of Record online : 22 NOV 2011, DOI: 10.1002/sec.398

  4. SecIoT: a security framework for the Internet of Things

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3083–3094, Xin Huang, Paul Craig, Hangyu Lin and Zheng Yan

    Version of Record online : 11 MAY 2015, DOI: 10.1002/sec.1259

  5. FairAccess: a new Blockchain-based access control framework for the Internet of Things

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5943–5964, Aafaf Ouaddah, Anas Abou Elkalam and Abdellah Ait Ouahman

    Version of Record online : 19 FEB 2017, DOI: 10.1002/sec.1748

  6. Context-aware usage control for web of things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2696–2712, Guangdong Bai, Lin Yan, Liang Gu, Yao Guo and Xiangqun Chen

    Version of Record online : 15 FEB 2012, DOI: 10.1002/sec.424

  7. Fusion: coalesced confidential storage and communication framework for the IoT

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2656–2673, Ibrahim Ethem Bagci, Shahid Raza, Utz Roedig and Thiemo Voigt

    Version of Record online : 30 APR 2015, DOI: 10.1002/sec.1260

  8. Secure communication for the Internet of Things—a comparison of link-layer security and IPsec for 6LoWPAN

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2654–2668, Shahid Raza, Simon Duquennoy, Joel Höglund, Utz Roedig and Thiemo Voigt

    Version of Record online : 18 JAN 2012, DOI: 10.1002/sec.406

  9. Analysis and taxonomy of security/QoS tradeoff solutions for the future internet

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2778–2803, Ana Nieto and Javier Lopez

    Version of Record online : 17 JUL 2013, DOI: 10.1002/sec.809

  10. How to protect security and privacy in the IoT: a policy-based RFID tag management protocol

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2669–2683, Evangelos Rekleitis, Panagiotis Rizomiliotis and Stefanos Gritzalis

    Version of Record online : 9 DEC 2011, DOI: 10.1002/sec.400

  11. A security communication model based on certificateless online/offline signcryption for Internet of Things

    Security and Communication Networks

    Volume 7, Issue 10, October 2014, Pages: 1560–1569, Ming Luo, Min Tu and Jianfeng Xu

    Version of Record online : 4 JUL 2013, DOI: 10.1002/sec.836

  12. Security and privacy issues for the network of the future

    Security and Communication Networks

    Volume 5, Issue 9, September 2012, Pages: 987–1005, Giannis F. Marias, João Barros, Markus Fiedler, Andreas Fischer, Harald Hauff, Ralph Herkenhoener, Antonio Grillo, Alessandro Lentini, Luisa Lima, Charlott Lorentzen, Wojciech Mazurczyk, Hermann de Meer, Paulo F. Oliveira, George C. Polyzos, Enric Pujol, Krzysztof Szczypiorski, João P. Vilela and Tiago T. V. Vinhoza

    Version of Record online : 25 OCT 2011, DOI: 10.1002/sec.384

  13. Technology classification, industry, and education for Future Internet of Things

    International Journal of Communication Systems

    Volume 25, Issue 9, September 2012, Pages: 1230–1241, Huansheng Ning and Sha Hu

    Version of Record online : 17 MAY 2012, DOI: 10.1002/dac.2373

  14. A privacy enhanced device access protocol for an IoT context

    Security and Communication Networks

    Volume 9, Issue 5, 25 March 2016, Pages: 440–450, G.M. Køien

    Version of Record online : 28 NOV 2013, DOI: 10.1002/sec.880

  15. Embedded Systems Security: A Survey of EU Research Efforts

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2016–2036, Charalampos Manifavas, Konstantinos Fysarakis, Alexandros Papanikolaou and Ioannis Papaefstathiou

    Version of Record online : 23 DEC 2014, DOI: 10.1002/sec.1151

  16. Constructing scalable Internet of Things services based on their event-driven models

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 17, 10 December 2015, Pages: 4819–4851, Yang Zhang and Jun-liang Chen

    Version of Record online : 29 APR 2015, DOI: 10.1002/cpe.3469

  17. Weaknesses of fingerprint-based mutual authentication protocol

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2124–2134, Pablo Picazo-Sanchez, Lara Ortiz-Martin, Pedro Peris-Lopez and Nasour Bagheri

    Version of Record online : 13 NOV 2014, DOI: 10.1002/sec.1161

  18. User-centric secure integration of personal RFID tags and sensor networks

    Security and Communication Networks

    Volume 6, Issue 10, October 2013, Pages: 1177–1197, Pablo Najera, Rodrigo Roman and Javier Lopez

    Version of Record online : 19 FEB 2013, DOI: 10.1002/sec.684

  19. Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3564–3579, Mickaël Cazorla, Sylvain Gourgeon, Kévin Marquet and Marine Minier

    Version of Record online : 20 MAY 2015, DOI: 10.1002/sec.1281

  20. MalPEFinder: fast and retrospective assessment of data breaches in malware attacks

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 899–915, Shun-Te Liu and Yi-Ming Chen

    Version of Record online : 4 NOV 2011, DOI: 10.1002/sec.390