Search Results

There are 93828 results for: content related to: Dynamic combination of authentication factors based on quantified risk and benefit

  1. Secure data transmission with cloud computing in heterogeneous wireless networks

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1325–1336, Chung-Hua Chu, Yen-Chieh Ouyang and Chang-Bu Jang

    Version of Record online : 29 JAN 2012, DOI: 10.1002/sec.409

  2. Comprehensive analysis of the authentication methods in wireless body area networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4777–4803, Mohammad Masdari and Safiyeh Ahmadzadeh

    Version of Record online : 17 OCT 2016, DOI: 10.1002/sec.1642

  3. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3282–3299, Jin Cao, Maode Ma and Hui Li

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1252

  4. An authentication, authorization, and accounting mechanism for 3G/WLAN networks

    Security and Communication Networks

    Volume 9, Issue 6, April 2016, Pages: 468–480, Wei-Chen Wu and Horng-Twu Liaw

    Version of Record online : 2 JUL 2013, DOI: 10.1002/sec.830

  5. Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4123–4135, Mehmet Sabir Kiraz, Ziya Alper Genc and Suleyman Kardas

    Version of Record online : 21 AUG 2015, DOI: 10.1002/sec.1329

  6. On the authentication and re-authentication protocols in LTE-WLAN interworking architecture

    Transactions on Emerging Telecommunications Technologies

    Volume 28, Issue 4, April 2017, Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful J. Hashim, Borhanuddin M. Ali and Abbas Jamalipour

    Version of Record online : 3 MAR 2016, DOI: 10.1002/ett.3031

  7. A two-factor authentication scheme with anonymity for multi-server environments

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1608–1625, Chi-Tung Chen and Cheng-Chi Lee

    Version of Record online : 5 SEP 2014, DOI: 10.1002/sec.1109

  8. Robust three-factor remote user authentication scheme with key agreement for multimedia systems

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 1916–1927, Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao and Xiaoke Zhao

    Version of Record online : 5 MAR 2014, DOI: 10.1002/sec.961

  9. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1378–1407, Rajeev Singh and Teek Parval Sharma

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1079

  10. Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 4924–4948, Mustapha Benssalah, Mustapha Djeddou and Karim Drouiche

    Version of Record online : 8 NOV 2016, DOI: 10.1002/sec.1665

  11. Authentication process enhancements in WiMAX networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4703–4725, Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful Jahari Hashim, Borhanuddin M. Ali and Abbas Jamalipour

    Version of Record online : 16 AUG 2016, DOI: 10.1002/sec.1577

  12. An efficient authentication system of smart device using multi factors in mobile cloud service architecture

    International Journal of Communication Systems

    Volume 28, Issue 4, 10 March 2015, Pages: 659–674, Young-Sik Jeong, Ji Soo Park and Jong Hyuk Park

    Version of Record online : 16 JAN 2014, DOI: 10.1002/dac.2694

  13. Privacy preserving smartcard-based authentication system with provable security

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3028–3044, Jin Wook Byun

    Version of Record online : 17 FEB 2015, DOI: 10.1002/sec.1229

  14. Efficient authentication and access control of scalable multimedia streams over packet-lossy networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 611–625, Robert H. Deng, Xuhua Ding and Swee-Won Lo

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.762

  15. Constructing authentication web in cloud computing

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2843–2860, Gansen Zhao, Zhongjie Ba, Xinming Wang, Feng Zhang, Changqin Huang and Yong Tang

    Version of Record online : 13 FEB 2015, DOI: 10.1002/sec.1202

  16. Mobile one-time passwords: two-factor authentication using mobile phones

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 508–516, Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar, Tai-Hoon Kim and Hassan Elkamchouchi

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.340

  17. A study of privacy problem solving using device and user authentication for M2M environments

    Security and Communication Networks

    Volume 7, Issue 10, October 2014, Pages: 1528–1535, Jin-Mook Kim, Hwa-Young Jeong and Bong-Hwa Hong

    Version of Record online : 15 FEB 2013, DOI: 10.1002/sec.695

  18. An 802.11 MAC layer covert channel

    Wireless Communications and Mobile Computing

    Volume 12, Issue 5, 10 April 2012, Pages: 393–405, Telvis E. Calhoun Jr, Xiaojun Cao, Yingshu Li and Raheem Beyah

    Version of Record online : 7 MAY 2010, DOI: 10.1002/wcm.969

  19. Attacks and improvements to chaotic map-based RFID authentication protocol

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4028–4040, Mete Akgün, Ali Osman Bayrak and Mehmet Ufuk Çaǧlayan

    Version of Record online : 24 JUL 2015, DOI: 10.1002/sec.1319

  20. An enhanced authentication protocol for WRANs in TV white space

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2267–2278, Cong Wang, Maode Ma and Zenghua Zhao

    Version of Record online : 23 JAN 2015, DOI: 10.1002/sec.1171