Search Results

There are 9284 results for: content related to: Access control for cloud-based eHealth social networking: design and evaluation

  1. You have full text access to this Open Access content
    An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.915

  2. You have full text access to this Open Access content
    Trust aware cooperative routing method for WANETs

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 6189–6201, P. Raghu Vamsi and Krishna Kant

    Version of Record online : 7 FEB 2017, DOI: 10.1002/sec.1765

  3. You have full text access to this Open Access content
    Security and trust management in opportunistic networks: a survey

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1812–1827, Yue Wu, Yimeng Zhao, Michel Riguidel, Guanghao Wang and Ping Yi

    Version of Record online : 18 SEP 2014, DOI: 10.1002/sec.1116

  4. You have full text access to this Open Access content
    A similarity-based indirect trust model with anti-spoofing capability

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5868–5881, Shuaishuai Tan, Yanming Liu, Xiaoping Li and Qingkuan Dong

    Version of Record online : 16 JAN 2017, DOI: 10.1002/sec.1742

  5. You have full text access to this Open Access content
    Intrusion-aware trust model for vehicular ad hoc networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1652–1669, Riaz Ahmed Shaikh and Ahmed Saeed Alzahrani

    Version of Record online : 19 AUG 2013, DOI: 10.1002/sec.862

  6. You have full text access to this Open Access content
    RITA: RIsk-aware Trust-based Architecture for collaborative multi-hop vehicular communications

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4428–4442, Chaker Abdelaziz Kerrache, Carlos T. Calafate, Nasreddine Lagraa, Juan-Carlos Cano and Pietro Manzoni

    Version of Record online : 6 OCT 2016, DOI: 10.1002/sec.1618

  7. You have full text access to this Open Access content
    Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  8. You have full text access to this Open Access content
    Comparative study of trust and reputation systems for wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 669–688, Osman Khalid, Samee U. Khan, Sajjad A. Madani, Khizar Hayat, Majid I. Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally and Dan Chen

    Version of Record online : 5 JUL 2012, DOI: 10.1002/sec.597

  9. You have full text access to this Open Access content
    Securing cooperative spectrum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3157–3166, Jingyu Feng, Yuqing Zhang, Guangyue Lu and Wenxiu Zheng

    Version of Record online : 3 MAR 2015, DOI: 10.1002/sec.1240

  10. You have full text access to this Open Access content
    Trust modeling for message relay control and local action decision making in VANETs

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 1–14, Jie Zhang, Chen Chen and Robin Cohen

    Version of Record online : 15 FEB 2012, DOI: 10.1002/sec.519

  11. You have full text access to this Open Access content
    Identity management-based social trust model for mediating information sharing and privacy enhancement

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 887–897, Mucheol Kim, Jiwan Seo, Sanghyun Noh and Sangyong Han

    Version of Record online : 3 OCT 2011, DOI: 10.1002/sec.379

  12. You have full text access to this Open Access content
    A lightweight trust management based on Bayesian and Entropy for wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 168–175, Shenyun Che, Renjian Feng, Xuan Liang and Xiao Wang

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.969

  13. You have full text access to this Open Access content
    Auction-based task allocation with trust management for shared sensor networks

    Security and Communication Networks

    Volume 5, Issue 11, November 2012, Pages: 1223–1234, Neda Edalat, Wendong Xiao, Mehul Motani, Nirmalya Roy and Sajal K. Das

    Version of Record online : 3 OCT 2012, DOI: 10.1002/sec.631

  14. You have full text access to this Open Access content
    Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1126–1142, Xinxin Fan, Mingchu Li, Hui Zhao, Xiaodong Chen, Zhenzhou Guo, Dong Jiao and Weifeng Sun

    Version of Record online : 15 FEB 2013, DOI: 10.1002/sec.682

  15. You have full text access to this Open Access content
    A dynamic trust evaluation mechanism based on affective intensity computing

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3752–3761, Guoqiang Zhou, Kuang Wang, Chen Zhao and Guofu Zhou

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1566

  16. You have full text access to this Open Access content
    TrustVis: visualizing trust toward attack identification in distributed computing environments

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1445–1459, Dichao Peng, Wei Chen and Qunsheng Peng

    Version of Record online : 7 MAR 2012, DOI: 10.1002/sec.521

  17. You have full text access to this Open Access content
    A security and trust framework for virtualized networks and software-defined networking

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3059–3069, Zheng Yan, Peng Zhang and Athanasios V. Vasilakos

    Version of Record online : 26 MAR 2015, DOI: 10.1002/sec.1243

  18. You have full text access to this Open Access content
    Embedded Systems Security: A Survey of EU Research Efforts

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2016–2036, Charalampos Manifavas, Konstantinos Fysarakis, Alexandros Papanikolaou and Ioannis Papaefstathiou

    Version of Record online : 23 DEC 2014, DOI: 10.1002/sec.1151

  19. You have full text access to this Open Access content
    GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.374

  20. You have full text access to this Open Access content
    A novel membership cloud model-based trust evaluation model for vehicular ad hoc network of T-CPS

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5710–5723, Dihua Sun, Hongzhuan Zhao and Senlin Cheng

    Version of Record online : 1 FEB 2017, DOI: 10.1002/sec.1730