Search Results

There are 6008 results for: content related to: A novel approach to detection of mobile rogue access points

  1. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  2. A survey and taxonomy of DoS attacks in cloud computing

    Security and Communication Networks

    Mohammad Masdari and Marzie Jalali

    Version of Record online : 13 JUL 2016, DOI: 10.1002/sec.1539

  3. Service delivery models of cloud computing: security issues and open challenges

    Security and Communication Networks

    Salman Iqbal, Miss Laiha Mat Kiah, Nor Badrul Anuar, Babak Daghighi, Ainuddin Wahid Abdul Wahab and Suleman Khan

    Version of Record online : 30 AUG 2016, DOI: 10.1002/sec.1585

  4. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4136–4156, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Version of Record online : 27 AUG 2015, DOI: 10.1002/sec.1330

  5. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  6. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  7. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  8. A survey of cyber crimes

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 422–437, Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.331

  9. An adaptable and scalable membership management for the iTrust information search and retrieval system

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3492–3510, Yung-Ting Chuang

    Version of Record online : 25 MAY 2015, DOI: 10.1002/sec.1273

  10. An anonymous and secure biometric-based enterprise digital rights management system for mobile environment

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3383–3404, Dheerendra Mishra, Ashok Kumar Das and Sourav Mukhopadhyay

    Version of Record online : 11 MAY 2015, DOI: 10.1002/sec.1266

  11. Attack modelling and security evaluation based on stochastic activity networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 714–737, Ali Sedaghatbaf and Mohammad Abdollahi Azgomi

    Version of Record online : 26 APR 2013, DOI: 10.1002/sec.774

  12. Authentication process enhancements in WiMAX networks

    Security and Communication Networks

    Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful Jahari Hashim, Borhanuddin M. Ali and Abbas Jamalipour

    Version of Record online : 16 AUG 2016, DOI: 10.1002/sec.1577

  13. Cooperative security management for broadband network environments

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3953–3977, Tiago Cruz, Paulo Simões, Edmundo Monteiro, Fernando Bastos and Alexandre Laranjeira

    Version of Record online : 20 JUL 2015, DOI: 10.1002/sec.1313

  14. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1193–1212, Abdelouahid Derhab and Abdelghani Bouras

    Version of Record online : 8 JUL 2014, DOI: 10.1002/sec.1074

  15. TSSDroid: realization of an efficient and usable TSS API for the Android software stack

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1553–1576, Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa and Toqeer Ali Syed

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1448

  16. Breaking down Captcha using edge corners and fuzzy logic segmentation/recognition technique

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3995–4012, Rabih Al. Nachar, Elie Inaty, Patrick J. Bonnin and Yasser Alayli

    Version of Record online : 10 AUG 2015, DOI: 10.1002/sec.1316

  17. Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3415–3440, Jaydeep Howlader and Ashis Kumar Mal

    Version of Record online : 25 MAY 2015, DOI: 10.1002/sec.1268

  18. KALwEN: a new practical and interoperable key management scheme for body sensor networks

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1309–1329, Yee Wei Law, Giorgi Moniava, Zheng Gong, Pieter Hartel and Marimuthu Palaniswami

    Version of Record online : 3 DEC 2010, DOI: 10.1002/sec.256

  19. A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 261–283, Mostafa Mohammadpourfard, Mohammad Ali Doostari, Mohammad Bagher Ghaznavi Ghoushchi and Nafiseh Shakiba

    Version of Record online : 12 MAR 2014, DOI: 10.1002/sec.978

  20. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3282–3299, Jin Cao, Maode Ma and Hui Li

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1252