Search Results

There are 5720 results for: content related to: Verifying cloud service-level agreement by a third-party auditor

  1. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  2. A survey and taxonomy of DoS attacks in cloud computing

    Security and Communication Networks

    Mohammad Masdari and Marzie Jalali

    Version of Record online : 13 JUL 2016, DOI: 10.1002/sec.1539

  3. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4136–4156, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Version of Record online : 27 AUG 2015, DOI: 10.1002/sec.1330

  4. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  5. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  6. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  7. A survey of cyber crimes

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 422–437, Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.331

  8. An adaptable and scalable membership management for the iTrust information search and retrieval system

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3492–3510, Yung-Ting Chuang

    Version of Record online : 25 MAY 2015, DOI: 10.1002/sec.1273

  9. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1193–1212, Abdelouahid Derhab and Abdelghani Bouras

    Version of Record online : 8 JUL 2014, DOI: 10.1002/sec.1074

  10. Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3415–3440, Jaydeep Howlader and Ashis Kumar Mal

    Version of Record online : 25 MAY 2015, DOI: 10.1002/sec.1268

  11. A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 261–283, Mostafa Mohammadpourfard, Mohammad Ali Doostari, Mohammad Bagher Ghaznavi Ghoushchi and Nafiseh Shakiba

    Version of Record online : 12 MAR 2014, DOI: 10.1002/sec.978

  12. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  13. A new secure and efficient scheme for network mobility management

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1360–1377, Salima Smaoui, Mohammad S. Obaidat, Faouzi Zarai and K. F. Hsiao

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1090

  14. Certificateless online/offline signcryption scheme

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 1979–1990, Jiguo Li, Jingjing Zhao and Yichen Zhang

    Version of Record online : 21 DEC 2014, DOI: 10.1002/sec.1146

  15. Modeling, conflict detection, and verification of a new virtualization role-based access control framework

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1904–1925, Yang Luo, Chunhe Xia, Liangshuang Lv, Zhao Wei and Yazhuo Li

    Version of Record online : 23 JUN 2014, DOI: 10.1002/sec.1025

  16. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1732–1751, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Version of Record online : 23 OCT 2014, DOI: 10.1002/sec.1139

  17. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.911

  18. Trust coercion in the name of usable public key infrastructure

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1734–1745, Dimitrios Zissis and Dimitrios Lekkas

    Version of Record online : 31 AUG 2013, DOI: 10.1002/sec.870

  19. Enterprise security pattern: a new type of security pattern

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1670–1690, Santiago Moral-García, Santiago Moral-Rubio, David G. Rosado, Eduardo B. Fernández and Eduardo Fernández-Medina

    Version of Record online : 6 MAR 2014, DOI: 10.1002/sec.863

  20. Traffic classification for managing Applications’ networking profiles

    Security and Communication Networks

    Hassan Alizadeh and André Zúquete

    Version of Record online : 4 JUL 2016, DOI: 10.1002/sec.1516