Search Results

There are 11573 results for: content related to: Secure communication for the Internet of Things—a comparison of link-layer security and IPsec for 6LoWPAN

  1. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  2. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 11 MAY 2011, DOI: 10.1002/sec.324

  3. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1378–1407, Rajeev Singh and Teek Parval Sharma

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1079

  4. Embedded Systems Security: A Survey of EU Research Efforts

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2016–2036, Charalampos Manifavas, Konstantinos Fysarakis, Alexandros Papanikolaou and Ioannis Papaefstathiou

    Version of Record online : 23 DEC 2014, DOI: 10.1002/sec.1151

  5. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.374

  6. Fusion: coalesced confidential storage and communication framework for the IoT

    Security and Communication Networks

    Ibrahim Ethem Bagci, Shahid Raza, Utz Roedig and Thiemo Voigt

    Version of Record online : 30 APR 2015, DOI: 10.1002/sec.1260

  7. Accountability using flow-net: design, implementation, and performance evaluation

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 29–49, Yang Xiao, Ke Meng and Daisuke Takahashi

    Version of Record online : 16 JUN 2011, DOI: 10.1002/sec.348

  8. A survey of lightweight stream ciphers for embedded systems

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1226–1246, Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis and Yannis Papaefstathiou

    Version of Record online : 21 DEC 2015, DOI: 10.1002/sec.1399

  9. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  10. SCADA communication and security issues

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 175–194, Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao, Wei Liang and C. L. Philip Chen

    Version of Record online : 24 JAN 2013, DOI: 10.1002/sec.698

  11. A survey of cyber crimes

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 422–437, Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.331

  12. Energy efficiency of encryption schemes applied to wireless sensor networks

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 789–808, Xueying Zhang, Howard M. Heys and Cheng Li

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.375

  13. Directional spread-spectrum modulation signal for physical layer security communication applications

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 182–193, Tao Hong, Mao-zhong Song and Yu Liu

    Version of Record online : 10 MAY 2012, DOI: 10.1002/sec.554

  14. Cooperative security management for broadband network environments

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3953–3977, Tiago Cruz, Paulo Simões, Edmundo Monteiro, Fernando Bastos and Alexandre Laranjeira

    Version of Record online : 20 JUL 2015, DOI: 10.1002/sec.1313

  15. Security and privacy issues for the network of the future

    Security and Communication Networks

    Volume 5, Issue 9, September 2012, Pages: 987–1005, Giannis F. Marias, João Barros, Markus Fiedler, Andreas Fischer, Harald Hauff, Ralph Herkenhoener, Antonio Grillo, Alessandro Lentini, Luisa Lima, Charlott Lorentzen, Wojciech Mazurczyk, Hermann de Meer, Paulo F. Oliveira, George C. Polyzos, Enric Pujol, Krzysztof Szczypiorski, João P. Vilela and Tiago T. V. Vinhoza

    Version of Record online : 25 OCT 2011, DOI: 10.1002/sec.384

  16. Towards efficient deployment of wireless sensor networks

    Security and Communication Networks

    Hacène Fouchal, Philippe Hunel and Cédric Ramassamy

    Version of Record online : 12 JUL 2014, DOI: 10.1002/sec.1059

  17. User-centric secure integration of personal RFID tags and sensor networks

    Security and Communication Networks

    Volume 6, Issue 10, October 2013, Pages: 1177–1197, Pablo Najera, Rodrigo Roman and Javier Lopez

    Version of Record online : 19 FEB 2013, DOI: 10.1002/sec.684

  18. A survey and taxonomy of DoS attacks in cloud computing

    Security and Communication Networks

    Mohammad Masdari and Marzie Jalali

    Version of Record online : 13 JUL 2016, DOI: 10.1002/sec.1539

  19. TSSL: improving SSL/TLS protocol by trust model

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1659–1671, Maryam Asadzadeh Kaljahi, Ali Payandeh and Mohammad Bagher Ghaznavi-Ghoushchi

    Version of Record online : 21 SEP 2014, DOI: 10.1002/sec.1113

  20. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186