Search Results

There are 3813 results for: content related to: Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks

  1. Secure group and multi-layer group communication schemes based on polynomial interpolation

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 735–756, Purushothama B. R. and B. B. Amberker

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.607

  2. On downlink power allocation for multiuser variable-bit-rate video streaming

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 485–497, Yingsong Huang, Shiwen Mao and Yihan Li

    Article first published online : 9 NOV 2012, DOI: 10.1002/sec.642

  3. Chaotic modulation-based spread spectrum communication using complex dynamics of chaotic DC–DC current mode controlled boost converter

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1053–1063, Manish Kumar Thukral and Karma Sonam Sherpa

    Article first published online : 10 DEC 2012, DOI: 10.1002/sec.665

  4. ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 401–419, Sanaa Taha and Xuemin (Sherman) Shen

    Article first published online : 9 OCT 2012, DOI: 10.1002/sec.625

  5. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  6. Modeling tools for detecting DoS attacks in WSNs

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 420–436, Paolo Ballarini, Lynda Mokdad and Quentin Monnet

    Article first published online : 14 FEB 2013, DOI: 10.1002/sec.630

  7. XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1420–1444, Devrim Unal and M. Ufuk Caglayan

    Article first published online : 27 JAN 2012, DOI: 10.1002/sec.411

  8. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540

  9. Compressive sensing-based data encryption system with application to sense-through-wall UWB noise radar

    Security and Communication Networks

    Ji Wu, Wei Wang, Qilian Liang, Xiaorong Wu and Baoju Zhang

    Article first published online : 3 JAN 2013, DOI: 10.1002/sec.670

  10. Self-protecting networking using dynamic p-cycle construction within link capacity constraint

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 689–708, Weiyi Zhang, Farah Kandah, Xiaojiang Du and Chonggang Wang

    Article first published online : 23 AUG 2011, DOI: 10.1002/sec.364

  11. Free global ID against collusion attack on multi-authority attribute-based encryption

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1143–1152, Ang Gao and Zengzhi Li

    Article first published online : 15 FEB 2013, DOI: 10.1002/sec.683

  12. Secure hybrid multibit multiplicative watermarking for media distribution over mobile Internet

    Security and Communication Networks

    Jinwei Wang, Leiming Yan, Jin Han and Yuxiang Wang

    Article first published online : 24 JAN 2013, DOI: 10.1002/sec.668

  13. Combining expert knowledge with automatic feature extraction for reliable web attack detection

    Security and Communication Networks

    Carmen Torrano-Gimenez, Hai Thanh Nguyen, Gonzalo Alvarez and Katrin Franke

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.603

  14. Performance comparison between IBE-HWMP and ECDSA-HWMP

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 437–449, Yesica Imelda Saavedra Benitez, Jalel Ben-othman and Jean-Pierre Claude

    Article first published online : 28 FEB 2013, DOI: 10.1002/sec.632

  15. Privacy and integrity preserving skyline queries in tiered sensor networks

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1177–1188, Jinguo Li, Yaping Lin, Gang Wang, Rui Li and Bo Yin

    Article first published online : 25 JUL 2013, DOI: 10.1002/sec.852

  16. Efficient and fault-diagnosable authentication architecture for AMI in smart grid

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 598–616, Depeng Li, Zeyar Aung, John R. Williams and Abel Sanchez

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1006

  17. TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 245–264, Mehran S. Fallah and Nafiseh Kahani

    Article first published online : 14 FEB 2013, DOI: 10.1002/sec.725

  18. On steganography in lost audio packets

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2602–2615, Wojciech Mazurczyk, Józef Lubacz and Krzysztof Szczypiorski

    Article first published online : 25 OCT 2011, DOI: 10.1002/sec.388

  19. Cipher feedback mode under go-back-N and selective-reject protocols in error channels

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 942–954, Xiannuan Liang, Yang Xiao, Suat Ozdemir, Athanasios V. Vasilakos and Hongmei Deng

    Article first published online : 12 OCT 2012, DOI: 10.1002/sec.638

  20. SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 234–244, Mi Wen, Rongxing Lu, Jingsheng Lei, Hongwei Li, Xiaoghui Liang and Xuemin (Sherman) Shen

    Article first published online : 18 JAN 2013, DOI: 10.1002/sec.699