Search Results

There are 14795 results for: content related to: A survey of accountability in computer networks and distributed systems

  1. Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 216–238, Suleyman Kondakci and Cemali Dincer

    Article first published online : 5 JAN 2011, DOI: 10.1002/sec.287

  2. RFID system for public train transportation

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 557–571, Chin-Ling Chen and Mei-Li Chong

    Article first published online : 5 NOV 2010, DOI: 10.1002/sec.260

  3. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  4. Secrecy coding for the binary symmetric wiretap channel

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 966–978, Yanling Chen and A. J. Han Vinck

    Article first published online : 8 SEP 2010, DOI: 10.1002/sec.230

  5. Performance of the verification for binary memoryless channels

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1212–1225, Vladimir B. Balakirsky and A. J. Han Vinck

    Article first published online : 8 NOV 2010, DOI: 10.1002/sec.263

  6. Cryptosystems based on continued fractions

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1199–1211, Ali Kanso

    Article first published online : 3 DEC 2010, DOI: 10.1002/sec.255

  7. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540

  8. Attack modelling and security evaluation based on stochastic activity networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 714–737, Ali Sedaghatbaf and Mohammad Abdollahi Azgomi

    Article first published online : 26 APR 2013, DOI: 10.1002/sec.774

  9. Directional spread-spectrum modulation signal for physical layer security communication applications

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 182–193, Tao Hong, Mao-zhong Song and Yu Liu

    Article first published online : 10 MAY 2012, DOI: 10.1002/sec.554

  10. XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1420–1444, Devrim Unal and M. Ufuk Caglayan

    Article first published online : 27 JAN 2012, DOI: 10.1002/sec.411

  11. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.374

  12. A non-associative lattice-based public key cryptosystem

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 145–163, Ehsan Malekian and Ali Zakerolhosseini

    Article first published online : 2 FEB 2011, DOI: 10.1002/sec.297

  13. Classifying malicious activities in Honeynets using entropy and volume-based thresholds

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 567–583, Mohammed H. Sqalli, Syed Naeem Firdous, Khaled Salah and Marwan Abu-Amara

    Article first published online : 3 JUL 2012, DOI: 10.1002/sec.575

  14. A scalable NAT-based solution to Internet access denial by higher-tier ISPs

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 194–209, Marwan Abu-Amara, Abdulaziz Al-Baiz, Ashraf S. Mahmoud, Mohammed H. Sqalli and Farag Azzedin

    Article first published online : 10 MAY 2012, DOI: 10.1002/sec.557

  15. An elliptic curve secret sharing key management scheme for mobile ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1405–1419, Hisham Dahshan and James Irvine

    Article first published online : 10 MAR 2011, DOI: 10.1002/sec.270

  16. Exploiting convergence characteristics to tackle collusion attacks in OLSR for Security and Communication Networks

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 108–122, Manoj Singh Gaur, Rajbir Kaur, Lalith P. Suresh and Vijay Laxmi

    Article first published online : 17 APR 2012, DOI: 10.1002/sec.545

  17. Analysis and control stratagems of flash disk virus dynamic propagation model

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 226–235, Cong Jin and Xiao-Yan Wang

    Article first published online : 15 FEB 2011, DOI: 10.1002/sec.310

  18. A stochastic learning automata-based solution for intrusion detection in vehicular ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 666–677, Sudip Misra, P. Venkata Krishna and Kiran Isaac Abraham

    Article first published online : 9 JUN 2010, DOI: 10.1002/sec.200

  19. Cardioids-based faster authentication and diagnosis of remote cardiovascular patients

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1351–1368, Fahim Sufi, Ibrahim Khalil and Ibrahim Habib

    Article first published online : 16 MAR 2011, DOI: 10.1002/sec.262

  20. Digital forensics of WLM 8.1 via check point methodology within corporate intranet in future communication security

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 1044–1062, Hai-Cheng Chu, Der-Jiunn Deng and Han-Chieh Chao

    Article first published online : 15 JUL 2010, DOI: 10.1002/sec.233