Search Results

There are 18426 results for: content related to: IKE vulnerability discovery based on fuzzing

  1. Securing mobile access with interactive image code and image key encryption

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3412–3427, Mungyu Bae, Jiyeon Lee, Suk Kyu Lee and Hwangnam Kim

    Version of Record online : 4 JUL 2016, DOI: 10.1002/sec.1548

  2. A smart fuzzing method for detecting heap-based vulnerabilities in executable codes

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5098–5115, Maryam Mouzarani, Babak Sadeghiyan and Mohammad Zolfaghari

    Version of Record online : 16 NOV 2016, DOI: 10.1002/sec.1681

  3. Structurized grammar-based fuzz testing for programs with highly structured inputs

    Security and Communication Networks

    Volume 6, Issue 11, November 2013, Pages: 1319–1330, Jingbo Yan, Yuqing Zhang and Dingning Yang

    Version of Record online : 22 MAR 2013, DOI: 10.1002/sec.714

  4. Secure Communication with RFID tags in the Internet of Things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2639–2653, Sandra Dominikus and Stefan Kraxberger

    Version of Record online : 22 NOV 2011, DOI: 10.1002/sec.398

  5. Virtual Private Networks

    Standard Article

    Encyclopedia of Telecommunications

    Marc-Alain Steinemann, Torsten Braun, Marc Danzeisen and Manuel Günter

    Published Online : 15 APR 2003, DOI: 10.1002/0471219282.eot331

  6. You have free access to this content
    Translation at higher than an optimal level interferes with coupling at an intercistronic junction

    Molecular Microbiology

    Volume 42, Issue 3, November 2001, Pages: 821–834, Jae-Sung Yu, Susan Madison-Antenucci and Deborah A. Steege

    Version of Record online : 7 JUL 2008, DOI: 10.1046/j.1365-2958.2001.02681.x

  7. You have free access to this content
    Structural and energetic basis of infection by the filamentous bacteriophage IKe

    Molecular Microbiology

    Volume 84, Issue 6, June 2012, Pages: 1124–1138, Roman P. Jakob, Anne-Juliane Geitner, Ulrich Weininger, Jochen Balbach, Holger Dobbek and Franz X. Schmid

    Version of Record online : 17 MAY 2012, DOI: 10.1111/j.1365-2958.2012.08079.x

  8. Secure communication for the Internet of Things—a comparison of link-layer security and IPsec for 6LoWPAN

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2654–2668, Shahid Raza, Simon Duquennoy, Joel Höglund, Utz Roedig and Thiemo Voigt

    Version of Record online : 18 JAN 2012, DOI: 10.1002/sec.406

  9. Dwight Eisenhower, Richard Nixon, and the Fund Crisis of 1952

    Historian

    Volume 73, Issue 3, Fall 2011, Pages: 526–547, JOHN W. MALSBERGER

    Version of Record online : 20 SEP 2011, DOI: 10.1111/j.1540-6563.2011.00300.x

  10. Stability, change, and the stability of change in daily workplace affect

    Journal of Organizational Behavior

    Volume 32, Issue 4, May 2011, Pages: 526–546, Daniel J. Beal and Louma Ghandour

    Version of Record online : 14 DEC 2010, DOI: 10.1002/job.713

  11. You have full text access to this OnlineOpen article
    U.S. IOOS coastal and ocean modeling testbed: Inter-model evaluation of tides, waves, and hurricane surge in the Gulf of Mexico

    Journal of Geophysical Research: Oceans

    Volume 118, Issue 10, October 2013, Pages: 5129–5172, P. C. Kerr, A. S. Donahue, J. J. Westerink, R. A. Luettich Jr., L. Y. Zheng, R. H. Weisberg, Y. Huang, H. V. Wang, Y. Teng, D. R. Forrest, A. Roland, A. T. Haase, A. W. Kramer, A. A. Taylor, J. R. Rhome, J. C. Feyen, R. P. Signell, J. L. Hanson, M. E. Hope, R. M. Estes, R. A. Dominguez, R. P. Dunbar, L. N. Semeraro, H. J. Westerink, A. B. Kennedy, J. M. Smith, M. D. Powell, V. J. Cardone and A. T. Cox

    Version of Record online : 8 OCT 2013, DOI: 10.1002/jgrc.20376

  12. Towards security architecture for Home (evolved) NodeB: challenges, requirements and solutions

    Security and Communication Networks

    Volume 4, Issue 4, April 2011, Pages: 471–481, R. Rajavelsamy, Jicheol Lee and Sungho Choi

    Version of Record online : 2 DEC 2009, DOI: 10.1002/sec.155

  13. Varied pathways for simulated tropical cyclone rapid intensification. Part II: Vertical motion and cloud populations

    Quarterly Journal of the Royal Meteorological Society

    Volume 142, Issue 697, April 2016 Part B, Pages: 1832–1846, Daniel S. Harnos and Stephen W. Nesbitt

    Version of Record online : 28 APR 2016, DOI: 10.1002/qj.2778

  14. Varied pathways for simulated tropical cyclone rapid intensification. Part I: Precipitation and environment

    Quarterly Journal of the Royal Meteorological Society

    Volume 142, Issue 697, April 2016 Part B, Pages: 1816–1831, Daniel S. Harnos and Stephen W. Nesbitt

    Version of Record online : 28 APR 2016, DOI: 10.1002/qj.2780

  15. A novel membership cloud model-based trust evaluation model for vehicular ad hoc network of T-CPS

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5710–5723, Dihua Sun, Hongzhuan Zhao and Senlin Cheng

    Version of Record online : 1 FEB 2017, DOI: 10.1002/sec.1730

  16. Analysis and improvement of the Internet-Draft IKEv3 protocol

    International Journal of Communication Systems

    Volume 30, Issue 9, June 2017, Qingfeng Cheng, Siqi Lu and Jianfeng Ma

    Version of Record online : 21 SEP 2016, DOI: 10.1002/dac.3194

  17. Differences in the determinants of posttraumatic stress disorder and depression after a mass traumatic event

    Depression and Anxiety

    Volume 28, Issue 8, August 2011, Pages: 666–675, Melissa Tracy, Fran H. Norris and Sandro Galea

    Version of Record online : 26 MAY 2011, DOI: 10.1002/da.20838

  18. Novel secure VPN architectures for LTE backhaul networks

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1198–1215, Madhusanka Liyanage, Pardeep Kumar, Mika Ylianttila and Andrei Gurtov

    Version of Record online : 11 JAN 2016, DOI: 10.1002/sec.1411

  19. Fusion: coalesced confidential storage and communication framework for the IoT

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2656–2673, Ibrahim Ethem Bagci, Shahid Raza, Utz Roedig and Thiemo Voigt

    Version of Record online : 30 APR 2015, DOI: 10.1002/sec.1260

  20. You have free access to this content
    Radiation of inertial kinetic energy as near-inertial waves forced by tropical Pacific Easterly waves

    Geophysical Research Letters

    Volume 40, Issue 9, 16 May 2013, Pages: 1760–1765, S. M. Soares and K. J. Richards

    Version of Record online : 9 MAY 2013, DOI: 10.1002/grl.50387