Search Results

There are 10889 results for: content related to: Critical analysis of counter mode with cipher block chain message authentication mode protocol—CCMP

  1. XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1420–1444, Devrim Unal and M. Ufuk Caglayan

    Article first published online : 27 JAN 2012, DOI: 10.1002/sec.411

  2. Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 216–238, Suleyman Kondakci and Cemali Dincer

    Article first published online : 5 JAN 2011, DOI: 10.1002/sec.287

  3. RFID system for public train transportation

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 557–571, Chin-Ling Chen and Mei-Li Chong

    Article first published online : 5 NOV 2010, DOI: 10.1002/sec.260

  4. Secrecy coding for the binary symmetric wiretap channel

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 966–978, Yanling Chen and A. J. Han Vinck

    Article first published online : 8 SEP 2010, DOI: 10.1002/sec.230

  5. Performance of the verification for binary memoryless channels

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1212–1225, Vladimir B. Balakirsky and A. J. Han Vinck

    Article first published online : 8 NOV 2010, DOI: 10.1002/sec.263

  6. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  7. An elliptic curve secret sharing key management scheme for mobile ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1405–1419, Hisham Dahshan and James Irvine

    Article first published online : 10 MAR 2011, DOI: 10.1002/sec.270

  8. Self-protecting networking using dynamic p-cycle construction within link capacity constraint

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 689–708, Weiyi Zhang, Farah Kandah, Xiaojiang Du and Chonggang Wang

    Article first published online : 23 AUG 2011, DOI: 10.1002/sec.364

  9. On steganography in lost audio packets

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2602–2615, Wojciech Mazurczyk, Józef Lubacz and Krzysztof Szczypiorski

    Article first published online : 25 OCT 2011, DOI: 10.1002/sec.388

  10. Attack modelling and security evaluation based on stochastic activity networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 714–737, Ali Sedaghatbaf and Mohammad Abdollahi Azgomi

    Article first published online : 26 APR 2013, DOI: 10.1002/sec.774

  11. Modeling, conflict detection, and verification of a new virtualization role-based access control framework

    Security and Communication Networks

    Yang Luo, Chunhe Xia, Liangshuang Lv, Zhao Wei and Yazhuo Li

    Article first published online : 23 JUN 2014, DOI: 10.1002/sec.1025

  12. Cryptosystems based on continued fractions

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1199–1211, Ali Kanso

    Article first published online : 3 DEC 2010, DOI: 10.1002/sec.255

  13. A non-associative lattice-based public key cryptosystem

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 145–163, Ehsan Malekian and Ali Zakerolhosseini

    Article first published online : 2 FEB 2011, DOI: 10.1002/sec.297

  14. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540

  15. Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1292–1309, Faraz Idris Khan, Taeshik Shon, Taekkyeun Lee and Ki-Hyung Kim

    Article first published online : 13 MAY 2014, DOI: 10.1002/sec.1023

  16. Cardioids-based faster authentication and diagnosis of remote cardiovascular patients

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1351–1368, Fahim Sufi, Ibrahim Khalil and Ibrahim Habib

    Article first published online : 16 MAR 2011, DOI: 10.1002/sec.262

  17. Performance evaluation of collision avoidance schemes in ad hoc networks

    Security and Communication Networks

    Suryakant Bhandare, Taha Ben Brahim, Saad Biaz and Prathima Agrawal

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.959

  18. An integrated detection system against false data injection attacks in the Smart Grid

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 91–109, Wei Yu, David Griffith, Linqiang Ge, Sulabh Bhattarai and Nada Golmie

    Article first published online : 4 MAR 2014, DOI: 10.1002/sec.957

  19. ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 401–419, Sanaa Taha and Xuemin (Sherman) Shen

    Article first published online : 9 OCT 2012, DOI: 10.1002/sec.625

  20. Directional spread-spectrum modulation signal for physical layer security communication applications

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 182–193, Tao Hong, Mao-zhong Song and Yu Liu

    Article first published online : 10 MAY 2012, DOI: 10.1002/sec.554