Search Results

There are 6411 results for: content related to: Compressive sensing-based data encryption system with application to sense-through-wall UWB noise radar

  1. Secured hierarchical secret sharing using ECC based signcryption

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 752–763, Atanu Basu, Indranil Sengupta and Jamuna Kanta Sing

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.370

  2. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540

  3. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  4. Security enhancement of the communication-efficient AUTHMAC_DH protocols

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 674–680, Chao Lv, Maode Ma, Hui Li, Jianfeng Ma and Ben Niu

    Article first published online : 29 SEP 2011, DOI: 10.1002/sec.361

  5. CSP-DHIES: a new public-key encryption scheme from matrix conjugation

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 809–822, Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li and Yixian Yang

    Article first published online : 3 OCT 2011, DOI: 10.1002/sec.376

  6. Data privacy breach prevention framework for the cloud service

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 982–1005, Chandramohan Dhasarathan, Vengattaraman Thirumal and Dhavachelvan Ponnurangam

    Article first published online : 15 JUN 2014, DOI: 10.1002/sec.1054

  7. Design of secure access control scheme for personal health record-based cloud healthcare service

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1332–1346, Chia-Hui Liu, Fong-Qi Lin, Chin-Sheng Chen and Tzer-Shyong Chen

    Article first published online : 8 AUG 2014, DOI: 10.1002/sec.1087

  8. Privacy and integrity preserving skyline queries in tiered sensor networks

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1177–1188, Jinguo Li, Yaping Lin, Gang Wang, Rui Li and Bo Yin

    Article first published online : 25 JUL 2013, DOI: 10.1002/sec.852

  9. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  10. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  11. Free global ID against collusion attack on multi-authority attribute-based encryption

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1143–1152, Ang Gao and Zengzhi Li

    Article first published online : 15 FEB 2013, DOI: 10.1002/sec.683

  12. A graph-theoretic framework for isolating botnets in a network

    Security and Communication Networks

    Padmini Jaikumar and Avinash C. Kak

    Article first published online : 28 FEB 2012, DOI: 10.1002/sec.500

  13. ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 401–419, Sanaa Taha and Xuemin (Sherman) Shen

    Article first published online : 9 OCT 2012, DOI: 10.1002/sec.625

  14. Chaotic modulation-based spread spectrum communication using complex dynamics of chaotic DC–DC current mode controlled boost converter

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1053–1063, Manish Kumar Thukral and Karma Sonam Sherpa

    Article first published online : 10 DEC 2012, DOI: 10.1002/sec.665

  15. Intelligent network security assessment with modeling and analysis of attack patterns

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1471–1486, Suleyman Kondakci

    Article first published online : 27 JUN 2012, DOI: 10.1002/sec.591

  16. Secure group and multi-layer group communication schemes based on polynomial interpolation

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 735–756, Purushothama B. R. and B. B. Amberker

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.607

  17. Client cloud Web service: reducing traffic consumption

    Security and Communication Networks

    Jung Ha Paik, Kwantae Cho, Boo Geum Jung and Dong Hoon Lee

    Article first published online : 5 JUN 2012, DOI: 10.1002/sec.544

  18. Leakage-probability-constrained secrecy capacity of a fading channel

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 583–593, Zhi Chen, Dapeng Wu, Pingyi Fan and Khaled Ben Letaief

    Article first published online : 2 AUG 2011, DOI: 10.1002/sec.353

  19. Self-protecting networking using dynamic p-cycle construction within link capacity constraint

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 689–708, Weiyi Zhang, Farah Kandah, Xiaojiang Du and Chonggang Wang

    Article first published online : 23 AUG 2011, DOI: 10.1002/sec.364

  20. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1192