Search Results

There are 18116 results for: content related to: STaR: design and quantitative measurement of source-location privacy for wireless sensor networks

  1. You have full text access to this Open Access content
    Distributed access control with adaptive privacy preserving property for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 759–773, Changsha Ma, Kaiping Xue and Peilin Hong

    Version of Record online : 30 APR 2013, DOI: 10.1002/sec.777

  2. You have full text access to this Open Access content
    Anonymous communication in overlay networks

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 229–240, Jian Ren, Yun Li, Tingting Jiang and Tongtong Li

    Version of Record online : 29 MAR 2012, DOI: 10.1002/sec.539

  3. You have full text access to this Open Access content
    An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.915

  4. You have full text access to this Open Access content
    Analysis and taxonomy of security/QoS tradeoff solutions for the future internet

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2778–2803, Ana Nieto and Javier Lopez

    Version of Record online : 17 JUL 2013, DOI: 10.1002/sec.809

  5. You have full text access to this Open Access content
    A comprehensive analysis for fair probability marking based traceback approach in WSNs

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2448–2475, Anfeng Liu, Xiao Liu and Yuxin Liu

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1515

  6. You have full text access to this Open Access content
    Embedded Systems Security: A Survey of EU Research Efforts

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2016–2036, Charalampos Manifavas, Konstantinos Fysarakis, Alexandros Papanikolaou and Ioannis Papaefstathiou

    Version of Record online : 23 DEC 2014, DOI: 10.1002/sec.1151

  7. You have full text access to this Open Access content
    Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  8. You have full text access to this Open Access content
    Comparative study of trust and reputation systems for wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 669–688, Osman Khalid, Samee U. Khan, Sajjad A. Madani, Khizar Hayat, Majid I. Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally and Dan Chen

    Version of Record online : 5 JUL 2012, DOI: 10.1002/sec.597

  9. You have full text access to this Open Access content
    Design of sinkhole node detection mechanism for hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4596–4614, Mohammad Wazid, Ashok Kumar Das, Saru Kumari and Muhammad Khurram Khan

    Version of Record online : 17 OCT 2016, DOI: 10.1002/sec.1652

  10. You have full text access to this Open Access content
    A comprehensive fault-tolerant framework for wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3247–3261, Mehdi Afsar

    Version of Record online : 26 MAR 2015, DOI: 10.1002/sec.1249

  11. You have full text access to this Open Access content
    Key splitting: making random key distribution schemes resistant against node capture

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 431–445, Mohammad Ehdaie, Nikos Alexiou, Mahmoud Ahmadian Attari, Mohammad Reza Aref and Panos Papadimitratos

    Version of Record online : 31 MAR 2014, DOI: 10.1002/sec.991

  12. You have full text access to this Open Access content
    Avoidance of misbehaving nodes in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1096–1114, Tal Grinshpoun, Amnon Meisels and Eyal Felstaine

    Version of Record online : 22 JUL 2013, DOI: 10.1002/sec.841

  13. You have full text access to this Open Access content
    An effective value swapping method for privacy preserving data publishing

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3219–3228, A S M Touhidul Hasan, Qingshan Jiang, Jun Luo, Chengming Li and Lifei Chen

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1527

  14. You have full text access to this Open Access content
    An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2070–2092, Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and Xiong Li

    Version of Record online : 23 FEB 2016, DOI: 10.1002/sec.1464

  15. You have full text access to this Open Access content
    Security analysis of a homomorphic signature scheme for network coding

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4053–4060, Chi Cheng, Tao Jiang, Yining Liu and Mingwu Zhang

    Version of Record online : 11 AUG 2015, DOI: 10.1002/sec.1321

  16. You have full text access to this Open Access content
    Energy efficiency of encryption schemes applied to wireless sensor networks

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 789–808, Xueying Zhang, Howard M. Heys and Cheng Li

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.375

  17. You have full text access to this Open Access content
    A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2836–2849, Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong and Xiaohua Jia

    Version of Record online : 13 FEB 2015, DOI: 10.1002/sec.1208

  18. You have full text access to this Open Access content
    Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.328

  19. You have full text access to this Open Access content
    Vulnerability-constrained multiple minimum cost paths for multi-source wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 9, June 2016, Pages: 862–873, Wei An, Song Ci, Haiyan Luo, Yanni Han, Tao Lin, Ding Tang and Ying Qi

    Version of Record online : 16 JAN 2014, DOI: 10.1002/sec.932

  20. You have full text access to this Open Access content
    A distributed secret share update scheme with public verifiability for ad hoc network

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1485–1493, Chen Zhenhua, Li Shundong, Wu Qianhong and Huang Qiong

    Version of Record online : 15 SEP 2014, DOI: 10.1002/sec.1097