Search Results

There are 4147 results for: content related to: A study of privacy problem solving using device and user authentication for M2M environments

  1. A security authentication scheme in machine-to-machine home network service

    Security and Communication Networks

    Xuebin Sun, Shuang Men, Chenglin Zhao and Zheng Zhou

    Article first published online : 10 MAY 2012, DOI: 10.1002/sec.551

  2. Research and implementation of M2M smart home and security system

    Security and Communication Networks

    Ting Jiang, Ming Yang and Yi Zhang

    Article first published online : 5 JUN 2012, DOI: 10.1002/sec.569

  3. M2M Optimizations in Public Mobile Networks

    M2M Communications: A Systems Approach

    Toon Norp, Bruno Landais, Pages: 141–188, 2012

    Published Online : 15 MAR 2012, DOI: 10.1002/9781119974031.ch6

  4. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Jin Cao, Maode Ma and Hui Li

    Article first published online : 22 APR 2015, DOI: 10.1002/sec.1252

  5. A survey of cyber crimes

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 422–437, Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

    Article first published online : 13 JUL 2011, DOI: 10.1002/sec.331

  6. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Article first published online : 11 MAY 2011, DOI: 10.1002/sec.324

  7. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1378–1407, Rajeev Singh and Teek Parval Sharma

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1079

  8. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.374

  9. Privacy in the Internet of Things: threats and challenges

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2728–2742, Jan Henrik Ziegeldorf, Oscar Garcia Morchon and Klaus Wehrle

    Article first published online : 10 JUN 2013, DOI: 10.1002/sec.795

  10. Accountability using flow-net: design, implementation, and performance evaluation

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 29–49, Yang Xiao, Ke Meng and Daisuke Takahashi

    Article first published online : 16 JUN 2011, DOI: 10.1002/sec.348

  11. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Angel Martín del Rey

    Article first published online : 28 JAN 2015, DOI: 10.1002/sec.1186

  12. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Article first published online : 30 OCT 2014, DOI: 10.1002/sec.1157

  13. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.911

  14. Medium access control techniques in M2M communication: survey and critical review

    Transactions on Emerging Telecommunications Technologies

    Fatima Hussain, Alagan Anpalagan and Rath Vannithamby

    Article first published online : 30 SEP 2014, DOI: 10.1002/ett.2869

  15. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.915

  16. Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks

    Bell Labs Technical Journal

    Volume 17, Issue 1, June 2012, Pages: 125–140, Ioannis Broustis, Ganapathy S. Sundaram and Harish Viswanathan

    Article first published online : 8 JUN 2012, DOI: 10.1002/bltj.21527

  17. SCADA communication and security issues

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 175–194, Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao, Wei Liang and C. L. Philip Chen

    Article first published online : 24 JAN 2013, DOI: 10.1002/sec.698

  18. Introduction to M2M

    M2M Communications: A Systems Approach

    Emmanuel Darmois, Omar Elloumi, Pages: 1–20, 2012

    Published Online : 15 MAR 2012, DOI: 10.1002/9781119974031.ch1

  19. ETSI M2M Services Architecture

    M2M Communications: A Systems Approach

    Omar Elloumi, Claudio Forlivesi, Pages: 95–140, 2012

    Published Online : 15 MAR 2012, DOI: 10.1002/9781119974031.ch5

  20. Security and trust management in opportunistic networks: a survey

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1812–1827, Yue Wu, Yimeng Zhao, Michel Riguidel, Guanghao Wang and Ping Yi

    Article first published online : 18 SEP 2014, DOI: 10.1002/sec.1116