Search Results

There are 2821 results for: content related to: Chaotic masking for securing RFID systems against relay attacks

  1. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  2. Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment

    Security and Communication Networks

    Jaydeep Howlader and Ashis Kumar Mal

    Article first published online : 25 MAY 2015, DOI: 10.1002/sec.1268

  3. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Angel Martín del Rey

    Article first published online : 28 JAN 2015, DOI: 10.1002/sec.1186

  4. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1732–1751, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 23 OCT 2014, DOI: 10.1002/sec.1139

  5. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.915

  6. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Article first published online : 20 FEB 2014, DOI: 10.1002/sec.955

  7. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  8. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  9. An anonymous and secure biometric-based enterprise digital rights management system for mobile environment

    Security and Communication Networks

    Ashok Kumar Das, Dheerendra Mishra and Sourav Mukhopadhyay

    Article first published online : 11 MAY 2015, DOI: 10.1002/sec.1266

  10. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1192

  11. A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction

    Security and Communication Networks

    Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong and Xiaohua Jia

    Article first published online : 13 FEB 2015, DOI: 10.1002/sec.1208

  12. Yet another attack on the chinese remainder theorem-based hierarchical access control scheme

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1079–1095, Niu Liu, Shaohua Tang and Lingling Xu

    Article first published online : 5 JUL 2013, DOI: 10.1002/sec.837

  13. Attack modelling and security evaluation based on stochastic activity networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 714–737, Ali Sedaghatbaf and Mohammad Abdollahi Azgomi

    Article first published online : 26 APR 2013, DOI: 10.1002/sec.774

  14. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1752–1771, Santanu Chatterjee and Ashok Kumar Das

    Article first published online : 14 OCT 2014, DOI: 10.1002/sec.1140

  15. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1193–1212, Abdelouahid Derhab and Abdelghani Bouras

    Article first published online : 8 JUL 2014, DOI: 10.1002/sec.1074

  16. Generic constructions of secure-channel free searchable encryption with adaptive security

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1547–1560, Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman and Kazumasa Omote

    Article first published online : 25 SEP 2014, DOI: 10.1002/sec.1103

  17. SecureTCG: a lightweight cheating-detection protocol for P2P multiplayer online trading card games

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2412–2431, Marcos A. Simplicio Jr., Mateus A.S. Santos, Rodrigo R. Leal, Marco A.L. Gomes and Walter A. Goya

    Article first published online : 17 JAN 2014, DOI: 10.1002/sec.952

  18. On false data injection attacks against Kalman filtering in power system dynamic state estimation

    Security and Communication Networks

    Qingyu Yang, Liguo Chang and Wei Yu

    Article first published online : 27 AUG 2013, DOI: 10.1002/sec.835

  19. Role-based and time-bound access and management of EHR data

    Security and Communication Networks

    Volume 7, Issue 6, June 2014, Pages: 994–1015, Rui Zhang, Ling Liu and Rui Xue

    Article first published online : 21 JUN 2013, DOI: 10.1002/sec.817

  20. TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 245–264, Mehran S. Fallah and Nafiseh Kahani

    Article first published online : 14 FEB 2013, DOI: 10.1002/sec.725