Search Results

There are 2822 results for: content related to: Component-based security system (COMSEC) with QoS for wireless sensor networks

  1. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.915

  2. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1752–1771, Santanu Chatterjee and Ashok Kumar Das

    Article first published online : 14 OCT 2014, DOI: 10.1002/sec.1140

  3. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  4. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Article first published online : 28 JAN 2015, DOI: 10.1002/sec.1186

  5. Provably secure group key agreement protocol based on ECDH with integrated signature

    Security and Communication Networks

    Vankamamidi S. Naresh and Nistala V. E. S. Murthy

    Article first published online : 29 DEC 2015, DOI: 10.1002/sec.1402

  6. Yet another attack on the chinese remainder theorem-based hierarchical access control scheme

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1079–1095, Niu Liu, Shaohua Tang and Lingling Xu

    Article first published online : 5 JUL 2013, DOI: 10.1002/sec.837

  7. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4136–4156, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 27 AUG 2015, DOI: 10.1002/sec.1330

  8. Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3415–3440, Jaydeep Howlader and Ashis Kumar Mal

    Article first published online : 25 MAY 2015, DOI: 10.1002/sec.1268

  9. Trust dynamic task allocation algorithm with Nash equilibrium for heterogeneous wireless sensor network

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1865–1877, Wen Zhong Guo, Jia Ye Chen, Guo Long Chen and Hai Feng Zheng

    Article first published online : 7 MAY 2014, DOI: 10.1002/sec.1026

  10. Context-aware usage control for web of things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2696–2712, Guangdong Bai, Lin Yan, Liang Gu, Yao Guo and Xiangqun Chen

    Article first published online : 15 FEB 2012, DOI: 10.1002/sec.424

  11. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Article first published online : 12 JAN 2015, DOI: 10.1002/sec.1164

  12. A comprehensive fault-tolerant framework for wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3247–3261, Mehdi Afsar

    Article first published online : 26 MAR 2015, DOI: 10.1002/sec.1249

  13. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1732–1751, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 23 OCT 2014, DOI: 10.1002/sec.1139

  14. Key splitting: making random key distribution schemes resistant against node capture

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 431–445, Mohammad Ehdaie, Nikos Alexiou, Mahmoud Ahmadian Attari, Mohammad Reza Aref and Panos Papadimitratos

    Article first published online : 31 MAR 2014, DOI: 10.1002/sec.991

  15. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Article first published online : 20 FEB 2014, DOI: 10.1002/sec.955

  16. Analyses of several recently proposed group key management schemes

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 136–148, Niu Liu, Shaohua Tang, Lingling Xu and Daojing He

    Article first published online : 5 MAR 2014, DOI: 10.1002/sec.966

  17. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  18. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Article first published online : 17 DEC 2012, DOI: 10.1002/sec.650

  19. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  20. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540