Search Results

There are 8751 results for: content related to: Unified threat model for analyzing and evaluating software threats

  1. A comprehensive analysis for fair probability marking based traceback approach in WSNs

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2448–2475, Anfeng Liu, Xiao Liu and Yuxin Liu

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1515

  2. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Version of Record online : 19 JUN 2012, DOI: 10.1002/sec.542

  3. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2070–2092, Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and Xiong Li

    Version of Record online : 23 FEB 2016, DOI: 10.1002/sec.1464

  4. Provably secure user authentication and key agreement scheme for wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3670–3687, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu and Xinyi Huang

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1573

  5. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1752–1771, Santanu Chatterjee and Ashok Kumar Das

    Version of Record online : 14 OCT 2014, DOI: 10.1002/sec.1140

  6. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4136–4156, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Version of Record online : 27 AUG 2015, DOI: 10.1002/sec.1330

  7. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4596–4614, Mohammad Wazid, Ashok Kumar Das, Saru Kumari and Muhammad Khurram Khan

    Version of Record online : 17 OCT 2016, DOI: 10.1002/sec.1652

  8. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Version of Record online : 1 JUN 2015, DOI: 10.1002/sec.1285

  9. Secure broadcast in distributed networks with strong adversaries

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3739–3750, Pawel Szalachowski and Tiffany Hyun-Jin Kim

    Version of Record online : 14 JUL 2015, DOI: 10.1002/sec.1296

  10. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  11. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  12. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1732–1751, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Version of Record online : 23 OCT 2014, DOI: 10.1002/sec.1139

  13. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.915

  14. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  15. Provably secure three-factor authentication and key agreement scheme for session initiation protocol

    Security and Communication Networks

    Sravani Challa, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Fan Wu and Xiong Li

    Version of Record online : 28 NOV 2016, DOI: 10.1002/sec.1707

  16. A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4650–4666, Ruhul Amin, SK Hafizul Islam, G.P. Biswas, Debasis Giri, Muhammad Khurram Khan and Neeraj Kumar

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1655

  17. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Version of Record online : 17 DEC 2012, DOI: 10.1002/sec.650

  18. Active jamming for multi-user information security improvement with the access statuses of users

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3893–3910, Datong Xu, Pinyi Ren, Qinghe Du and Li Sun

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1592

  19. Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3688–3702, Yinghui Zhang, Dong Zheng, Qi Li, Jin Li and Hui Li

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1574

  20. Efficient oblivious transfer with adaptive queries in UC framework

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2592–2611, Vandana Guleria and Ratna Dutta

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1505