Search Results

There are 1595 results for: content related to: A study of IP prefix hijacking in cloud computing networks

  1. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Abdelouahid Derhab and Abdelghani Bouras

    Article first published online : 8 JUL 2014, DOI: 10.1002/sec.1074

  2. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  3. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

    Security and Communication Networks

    Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 23 OCT 2014, DOI: 10.1002/sec.1139

  4. Attack modelling and security evaluation based on stochastic activity networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 714–737, Ali Sedaghatbaf and Mohammad Abdollahi Azgomi

    Article first published online : 26 APR 2013, DOI: 10.1002/sec.774

  5. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Article first published online : 18 MAY 2011, DOI: 10.1002/sec.328

  6. A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 261–283, Mostafa Mohammadpourfard, Mohammad Ali Doostari, Mohammad Bagher Ghaznavi Ghoushchi and Nafiseh Shakiba

    Article first published online : 12 MAR 2014, DOI: 10.1002/sec.978

  7. A two-factor authentication scheme with anonymity for multi-server environments

    Security and Communication Networks

    Chi-Tung Chen and Cheng-Chi Lee

    Article first published online : 5 SEP 2014, DOI: 10.1002/sec.1109

  8. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Article first published online : 12 JAN 2015, DOI: 10.1002/sec.1164

  9. Trust and reputation management in cognitive radio networks: a survey

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2160–2179, Mee Hong Ling, Kok-Lim Alvin Yau and Geong Sen Poh

    Article first published online : 8 NOV 2013, DOI: 10.1002/sec.899

  10. Efficient authentication and access control of scalable multimedia streams over packet-lossy networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 611–625, Robert H. Deng, Xuhua Ding and Swee-Won Lo

    Article first published online : 21 MAR 2013, DOI: 10.1002/sec.762

  11. DMAM: distributed mobility and authentication mechanism in next generation networks

    Security and Communication Networks

    Muhammad Zubair, Xiangwei Kong and Saeed Mahfooz

    Article first published online : 22 JUN 2014, DOI: 10.1002/sec.1041

  12. C2Detector: a covert channel detection framework in cloud computing

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 544–557, Jingzheng Wu, Liping Ding, Yanjun Wu, Nasro Min-Allah, Samee U. Khan and Yongji Wang

    Article first published online : 8 MAY 2013, DOI: 10.1002/sec.754

  13. Efficient and fault-diagnosable authentication architecture for AMI in smart grid

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 598–616, Depeng Li, Zeyar Aung, John R. Williams and Abel Sanchez

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1006

  14. Remote three-factor authentication scheme based on Fuzzy extractors

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 682–693, Min Zhang, Jiashu Zhang and Ying Zhang

    Article first published online : 5 MAY 2014, DOI: 10.1002/sec.1016

  15. A practical strongly secure one-round authenticated key exchange protocol without random oracles

    Security and Communication Networks

    Zheng Yang and Wu Yang

    Article first published online : 9 SEP 2014, DOI: 10.1002/sec.1067

  16. TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 245–264, Mehran S. Fallah and Nafiseh Kahani

    Article first published online : 14 FEB 2013, DOI: 10.1002/sec.725

  17. Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

    Security and Communication Networks

    SK Hafizul Islam, Muhammad Khurram Khan and Ali M. Al-Khouri

    Article first published online : 14 NOV 2014, DOI: 10.1002/sec.1165

  18. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1192

  19. A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems

    Security and Communication Networks

    Wenfang Zhang, Xiaomin Wang and Muhammad Khurram Khan

    Article first published online : 10 JUN 2014, DOI: 10.1002/sec.1051

  20. An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1921–1932, Saru Kumari, Mridul K. Gupta, Muhammad Khurram Khan and Xiong Li

    Article first published online : 13 NOV 2013, DOI: 10.1002/sec.906