Search Results

There are 14131 results for: content related to: Special Issue on the Design and Engineering of Cryptographic Solutions for Secure Information Systems

  1. You have free access to this content
    Security technologies and applications for convergence environments

    Security and Communication Networks

    Volume 5, Issue 3, March 2012, Pages: 249–251, Prof. James J.(Jong Hyuk) Park, Prof. Shiuh-Jeng Wang and Dr. Damien Sauveron

    Article first published online : 22 DEC 2011, DOI: 10.1002/sec.402

  2. You have free access to this content
    Special issue on “security and privacy in pervasive and ubiquitous computing and communication systems”

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1522–1523, Peng Liu, Refik Molva and Jiwu Jing

    Article first published online : 28 NOV 2013, DOI: 10.1002/sec.947

  3. You have free access to this content
    Special issue on next generation communication and network security

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1083–1085, Taeshik Shon, Costas Lambrinoudakis and Xiaobo Zhou

    Article first published online : 28 AUG 2012, DOI: 10.1002/sec.636

  4. You have full text access to this OnlineOpen article
    Advanced processing technologies and applications for mobile communication systems

    International Journal of Communication Systems

    Volume 26, Issue 6, June 2013, Pages: 687–689, Sang Soo Yeo, Shiuh-Jeng Wang and Rodrigo Román Castro

    Article first published online : 17 MAY 2013, DOI: 10.1002/dac.2554

  5. Defending against insider threats and internal data leakage

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 831–833, Ilsun You, Gabriele Lenzini, Marek R Ogiela and Elisa Bertino

    Article first published online : 25 JUL 2012, DOI: 10.1002/sec.598

  6. Adaptive anomaly control for alleviating the exclusive channel occupation in wireless networks

    International Journal of Communication Systems

    Volume 26, Issue 6, June 2013, Pages: 720–731, Hyunhee Park, Taeshik Shon, Seunghyun Park and Eui-Jik Kim

    Article first published online : 2 APR 2012, DOI: 10.1002/dac.2357

  7. Analysis and performance evaluation of new coding options for space telecommand links - Part I: AWGN channels

    International Journal of Satellite Communications and Networking

    M. Baldi, F. Chiaraluce, R. Garello, N. Maturo, I. Aguilar Sanchez and S. Cioni

    Article first published online : 9 SEP 2014, DOI: 10.1002/sat.1092

  8. Analysis and performance evaluation of new coding options for space telecommand links – part II: jamming channels

    International Journal of Satellite Communications and Networking

    M. Baldi, F. Chiaraluce, R. Garello, N. Maturo, I. Aguilar Sanchez and S. Cioni

    Article first published online : 8 SEP 2014, DOI: 10.1002/sat.1091

  9. Distributed collision control with the integration of packet size for congestion control in wireless sensor networks

    Wireless Communications and Mobile Computing

    Naimah Yaakob, Ibrahim Khalil, Mohammed Atiquzzaman, Ibrahim Habib and Jiankun Hu

    Article first published online : 18 JUL 2014, DOI: 10.1002/wcm.2488

  10. You have free access to this content
    Security of e-systems

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 322–324, Mohammad S. Obaidat, Petros Nicopolitidis and Weili Han

    Article first published online : 28 NOV 2013, DOI: 10.1002/sec.897

  11. On the inference and prediction of DDoS campaigns

    Wireless Communications and Mobile Computing

    Claude Fachkha, Elias Bou-Harb and Mourad Debbabi

    Article first published online : 6 AUG 2014, DOI: 10.1002/wcm.2510

  12. You have free access to this content
    Security and privacy in emerging information technologies

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 1–2, Xiaodong Lin, Jianwei Liu and Stefanos Gritzalis

    Article first published online : 27 OCT 2011, DOI: 10.1002/sec.394

  13. A reliable overlay video transport protocol for multicast agents in wireless mesh networks

    International Journal of Communication Systems

    Volume 25, Issue 5, May 2012, Pages: 553–570, Jinsuk Baek, Paul S. Fisher, Minho Jo and Hsiao-Hwa Chen

    Article first published online : 20 APR 2009, DOI: 10.1002/dac.1009

  14. Maturity assessment and process improvement for information security management in small and medium enterprises

    Journal of Software: Evolution and Process

    Volume 26, Issue 5, May 2014, Pages: 496–503, Hervé Cholez and Frédéric Girard

    Article first published online : 12 JUL 2013, DOI: 10.1002/smr.1609

  15. A simple and efficient authentication scheme for mobile satellite communication systems

    International Journal of Satellite Communications and Networking

    Volume 30, Issue 1, January/February 2012, Pages: 29–38, Cheng-Chi Lee, Chun-Ta Li and Rui-Xiang Chang

    Article first published online : 22 DEC 2011, DOI: 10.1002/sat.993

  16. Providing reliable and link stability-based geocasting model in underwater environment

    International Journal of Communication Systems

    Volume 25, Issue 3, March 2012, Pages: 356–375, Sanjay K. Dhurandher, Mohammad S. Obaidat and Megha Gupta

    Article first published online : 24 FEB 2011, DOI: 10.1002/dac.1245

  17. An efficient approach to reduce alerts generated by multiple IDS products

    International Journal of Network Management

    Volume 24, Issue 3, May/June 2014, Pages: 153–180, Tu Hoang Nguyen, Jiawei Luo and Humphrey Waita Njogu

    Article first published online : 21 MAR 2014, DOI: 10.1002/nem.1857

  18. Routing bandwidth guaranteed paths for traffic engineering in WiMAX mesh networks

    International Journal of Communication Systems

    Sudip Misra, Tushar I. Ghosh and Mohammad S. Obaidat

    Article first published online : 15 APR 2013, DOI: 10.1002/dac.2518

  19. A novel low-power RF4CE-based communication framework for multimedia system control

    International Journal of Communication Systems

    Volume 24, Issue 10, October 2011, Pages: 1340–1353, Bonhyun Koo, Wook Choi, James J. (Jong Hyuk) Park and Taeshik Shon

    Article first published online : 23 JAN 2011, DOI: 10.1002/dac.1223

  20. Exploiting cognitive radios for reliable satellite communications

    International Journal of Satellite Communications and Networking

    Mohammad J. Abdel-Rahman, Marwan Krunz and Richard Erwin

    Article first published online : 22 JUN 2014, DOI: 10.1002/sat.1083