Search Results

There are 12531 results for: content related to: Exploiting convergence characteristics to tackle collusion attacks in OLSR for Security and Communication Networks

  1. DUTY AND KNOWLEDGE

    Philosophical Perspectives

    Volume 28, Issue 1, December 2014, Pages: 95–110, Yoaav Isaacs

    Version of Record online : 22 DEC 2014, DOI: 10.1111/phpe.12042

  2. Primordial Moral Awareness: Levinas, Conscience, and the Unavoidable Call to Responsibility

    The Heythrop Journal

    Volume 56, Issue 4, July 2015, Pages: 604–618, Daniel J. Fleming

    Version of Record online : 18 MAY 2015, DOI: 10.1111/heyj.12267

  3. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Version of Record online : 19 JUN 2012, DOI: 10.1002/sec.542

  4. A graph-theoretic framework for isolating botnets in a network

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2605–2623, Padmini Jaikumar and Avinash C. Kak

    Version of Record online : 28 FEB 2012, DOI: 10.1002/sec.500

  5. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Version of Record online : 17 MAY 2012, DOI: 10.1002/sec.540

  6. Intelligent network security assessment with modeling and analysis of attack patterns

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1471–1486, Suleyman Kondakci

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.591

  7. Client cloud Web service: reducing traffic consumption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 248–261, Jung Ha Paik, Kwantae Cho, Boo Geum Jung and Dong Hoon Lee

    Version of Record online : 5 JUN 2012, DOI: 10.1002/sec.544

  8. Context-aware usage control for web of things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2696–2712, Guangdong Bai, Lin Yan, Liang Gu, Yao Guo and Xiangqun Chen

    Version of Record online : 15 FEB 2012, DOI: 10.1002/sec.424

  9. Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4098–4109, Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong and Ximeng Liu

    Version of Record online : 25 AUG 2015, DOI: 10.1002/sec.1326

  10. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3282–3299, Jin Cao, Maode Ma and Hui Li

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1252

  11. Security assurance in wireless acoustic sensors via event forecasting and detection

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2671–2677, Zhen Zhong, Chenglin Zhao, Yiming Pi and Lingming Wang

    Version of Record online : 26 APR 2012, DOI: 10.1002/sec.538

  12. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3356–3371, Zheng Yang, Wu Yang, Lingyun Zhu and Daigu Zhang

    Version of Record online : 19 MAY 2015, DOI: 10.1002/sec.1263

  13. Efficient homomorphic sealed-bid auction free of bid validity check and equality test

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 64–76, Kun Peng

    Version of Record online : 17 MAY 2012, DOI: 10.1002/sec.549

  14. Attacks and improvements to chaotic map-based RFID authentication protocol

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4028–4040, Mete Akgün, Ali Osman Bayrak and Mehmet Ufuk Çaǧlayan

    Version of Record online : 24 JUL 2015, DOI: 10.1002/sec.1319

  15. Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3205–3218, Xiang Cheng, Sen Su, Yiping Teng and Ke Xiao

    Version of Record online : 30 MAR 2015, DOI: 10.1002/sec.1245

  16. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Version of Record online : 1 JUN 2015, DOI: 10.1002/sec.1285

  17. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  18. Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 740–750, Joonsang Baek, Young-ji Byon, Eman Hableel and Mahmoud Al-Qutayri

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1021

  19. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  20. An efficient batch verification system and its effect in a real time VANET environment

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 298–310, Jiageng Chen, Mohammad Saiful Islam Mamun and Atsuko Miyaji

    Version of Record online : 18 MAR 2014, DOI: 10.1002/sec.980