Search Results

There are 7157 results for: content related to: A study of privacy problem solving using device and user authentication for M2M environments

  1. A security authentication scheme in machine-to-machine home network service

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2678–2686, Xuebin Sun, Shuang Men, Chenglin Zhao and Zheng Zhou

    Version of Record online : 10 MAY 2012, DOI: 10.1002/sec.551

  2. An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1146–1157, Shuo Chen, Maode Ma and Zhenxing Luo

    Version of Record online : 14 JAN 2016, DOI: 10.1002/sec.1407

  3. Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2245–2260, Fatemeh Faraji Daneshgar and Maghsoud Abbaspour

    Version of Record online : 15 APR 2016, DOI: 10.1002/sec.1483

  4. M2M Optimizations in Public Mobile Networks

    M2M Communications: A Systems Approach

    Toon Norp, Bruno Landais, Pages: 141–188, 2012

    Published Online : 15 MAR 2012, DOI: 10.1002/9781119974031.ch6

  5. Medium access control techniques in M2M communication: survey and critical review

    Transactions on Emerging Telecommunications Technologies

    Fatima Hussain, Alagan Anpalagan and Rath Vannithamby

    Version of Record online : 30 SEP 2014, DOI: 10.1002/ett.2869

  6. Research and implementation of M2M smart home and security system

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2704–2711, Ting Jiang, Ming Yang and Yi Zhang

    Version of Record online : 5 JUN 2012, DOI: 10.1002/sec.569

  7. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  8. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3282–3299, Jin Cao, Maode Ma and Hui Li

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1252

  9. Smart Cards in M2M Communication

    M2M Communications: A Systems Approach

    David Boswarthick, Omar Elloumi, Olivier Hersent, Pages: 273–294, 2012

    Published Online : 15 MAR 2012, DOI: 10.1002/9781119974031.ch10

  10. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 11 MAY 2011, DOI: 10.1002/sec.324

  11. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.374

  12. Privacy in the Internet of Things: threats and challenges

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2728–2742, Jan Henrik Ziegeldorf, Oscar Garcia Morchon and Klaus Wehrle

    Version of Record online : 10 JUN 2013, DOI: 10.1002/sec.795

  13. Accountability using flow-net: design, implementation, and performance evaluation

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 29–49, Yang Xiao, Ke Meng and Daisuke Takahashi

    Version of Record online : 16 JUN 2011, DOI: 10.1002/sec.348

  14. A survey of lightweight stream ciphers for embedded systems

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1226–1246, Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis and Yannis Papaefstathiou

    Version of Record online : 21 DEC 2015, DOI: 10.1002/sec.1399

  15. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  16. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  17. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.915

  18. A survey on security vulnerabilities in channel assignment algorithms of multi-interface wireless mesh networks

    Security and Communication Networks

    Maryam Asadzadeh Kaljahi and Mohsen Jahanshahi

    Version of Record online : 22 NOV 2016, DOI: 10.1002/sec.1691

  19. Computer operating system logging and security issues: a survey

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4804–4821, Lei Zeng, Yang Xiao, Hui Chen, Bo Sun and Wenlin Han

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1677

  20. A survey on cloud forensics challenges and solutions

    Security and Communication Networks

    Stavros Simou, Christos Kalloniatis, Stefanos Gritzalis and Haralambos Mouratidis

    Version of Record online : 8 NOV 2016, DOI: 10.1002/sec.1688