Search Results

There are 9384 results for: content related to: A new intrusion detection method based on SVM with minimum within-class scatter

  1. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Article first published online : 21 JUN 2012, DOI: 10.1002/sec.566

  2. An enhanced Kerberos protocol with non-interactive zero-knowledge proof

    Security and Communication Networks

    Yuesheng Zhu, Limin Ma and Jinjiang Zhang

    Article first published online : 19 JUN 2014, DOI: 10.1002/sec.1066

  3. Adaptive pattern mining model for early detection of botnet-propagation scale

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 917–927, Do Hoon Kim, Taek Lee, Jaewoo Kang, Hyunchoel Jeong and Hoh Peter In

    Article first published online : 6 OCT 2011, DOI: 10.1002/sec.366

  4. A novel signature based on the combination of global and local signatures for image copy detection

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1702–1711, Zhili Zhou, Xingming Sun, Xianyi Chen, Cheng Chang and Zhangjie Fu

    Article first published online : 19 AUG 2013, DOI: 10.1002/sec.866

  5. You have free access to this content
    A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  6. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Article first published online : 24 FEB 2012, DOI: 10.1002/sec.509

  7. You have free access to this content
    Efficient homomorphic sealed-bid auction free of bid validity check and equality test

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 64–76, Kun Peng

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.549

  8. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Article first published online : 22 FEB 2012, DOI: 10.1002/sec.417

  9. An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2527–2541, Chin-Ling Chen and Chun-Yi Wu

    Article first published online : 7 OCT 2011, DOI: 10.1002/sec.383

  10. CSP-DHIES: a new public-key encryption scheme from matrix conjugation

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 809–822, Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li and Yixian Yang

    Article first published online : 3 OCT 2011, DOI: 10.1002/sec.376

  11. Security analysis of an ultra-lightweight RFID authentication protocol—SLMAP*

    Security and Communication Networks

    Volume 5, Issue 3, March 2012, Pages: 287–291, Imran Erguler, Cihan Unsal, Emin Anarim and Gokay Saldamli

    Article first published online : 30 MAY 2011, DOI: 10.1002/sec.347

  12. Design of secure access control scheme for personal health record-based cloud healthcare service

    Security and Communication Networks

    Chia-Hui Liu, Fong-Qi Lin, Chin-Sheng Chen and Tzer-Shyong Chen

    Article first published online : 8 AUG 2014, DOI: 10.1002/sec.1087

  13. Privacy and integrity preserving skyline queries in tiered sensor networks

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1177–1188, Jinguo Li, Yaping Lin, Gang Wang, Rui Li and Bo Yin

    Article first published online : 25 JUL 2013, DOI: 10.1002/sec.852

  14. A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 588–601, Amizah Malip, Siaw-Lynn Ng and Qin Li

    Article first published online : 21 MAR 2013, DOI: 10.1002/sec.760

  15. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Article first published online : 7 NOV 2013, DOI: 10.1002/sec.827

  16. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Article first published online : 17 DEC 2012, DOI: 10.1002/sec.650

  17. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  18. Privacy enhancement for fair PayWord-based micropayment

    Security and Communication Networks

    Chun-I Fan, Yu-Kuang Liang and Chien-Nan Wu

    Article first published online : 28 NOV 2012, DOI: 10.1002/sec.672

  19. Free global ID against collusion attack on multi-authority attribute-based encryption

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1143–1152, Ang Gao and Zengzhi Li

    Article first published online : 15 FEB 2013, DOI: 10.1002/sec.683

  20. Attribute-based ring signcryption scheme

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 790–796, Zhenzhou Guo, Mingchu Li and Xinxin Fan

    Article first published online : 28 SEP 2012, DOI: 10.1002/sec.614