Search Results

There are 11505 results for: content related to: Detecting and mitigating interest flooding attacks in content-centric network

  1. Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 216–238, Suleyman Kondakci and Cemali Dincer

    Article first published online : 5 JAN 2011, DOI: 10.1002/sec.287

  2. RFID system for public train transportation

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 557–571, Chin-Ling Chen and Mei-Li Chong

    Article first published online : 5 NOV 2010, DOI: 10.1002/sec.260

  3. Secrecy coding for the binary symmetric wiretap channel

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 966–978, Yanling Chen and A. J. Han Vinck

    Article first published online : 8 SEP 2010, DOI: 10.1002/sec.230

  4. Performance of the verification for binary memoryless channels

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1212–1225, Vladimir B. Balakirsky and A. J. Han Vinck

    Article first published online : 8 NOV 2010, DOI: 10.1002/sec.263

  5. Cryptosystems based on continued fractions

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1199–1211, Ali Kanso

    Article first published online : 3 DEC 2010, DOI: 10.1002/sec.255

  6. XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1420–1444, Devrim Unal and M. Ufuk Caglayan

    Article first published online : 27 JAN 2012, DOI: 10.1002/sec.411

  7. A non-associative lattice-based public key cryptosystem

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 145–163, Ehsan Malekian and Ali Zakerolhosseini

    Article first published online : 2 FEB 2011, DOI: 10.1002/sec.297

  8. Compressive sensing-based data encryption system with application to sense-through-wall UWB noise radar

    Security and Communication Networks

    Ji Wu, Wei Wang, Qilian Liang, Xiaorong Wu and Baoju Zhang

    Article first published online : 3 JAN 2013, DOI: 10.1002/sec.670

  9. An elliptic curve secret sharing key management scheme for mobile ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1405–1419, Hisham Dahshan and James Irvine

    Article first published online : 10 MAR 2011, DOI: 10.1002/sec.270

  10. Analysis and control stratagems of flash disk virus dynamic propagation model

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 226–235, Cong Jin and Xiao-Yan Wang

    Article first published online : 15 FEB 2011, DOI: 10.1002/sec.310

  11. A stochastic learning automata-based solution for intrusion detection in vehicular ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 666–677, Sudip Misra, P. Venkata Krishna and Kiran Isaac Abraham

    Article first published online : 9 JUN 2010, DOI: 10.1002/sec.200

  12. Cardioids-based faster authentication and diagnosis of remote cardiovascular patients

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1351–1368, Fahim Sufi, Ibrahim Khalil and Ibrahim Habib

    Article first published online : 16 MAR 2011, DOI: 10.1002/sec.262

  13. Digital forensics of WLM 8.1 via check point methodology within corporate intranet in future communication security

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 1044–1062, Hai-Cheng Chu, Der-Jiunn Deng and Han-Chieh Chao

    Article first published online : 15 JUL 2010, DOI: 10.1002/sec.233

  14. Modeling, conflict detection, and verification of a new virtualization role-based access control framework

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1904–1925, Yang Luo, Chunhe Xia, Liangshuang Lv, Zhao Wei and Yazhuo Li

    Article first published online : 23 JUN 2014, DOI: 10.1002/sec.1025

  15. A self-stabilized random access protocol against denial of service attack in wireless networks

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 1075–1087, Jahangir H. Sarker and Hussein T. Mouftah

    Article first published online : 3 DEC 2010, DOI: 10.1002/sec.248

  16. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 929–943, Arpan Roy, Dong Seong Kim and Kishor S. Trivedi

    Article first published online : 2 FEB 2011, DOI: 10.1002/sec.299

  17. SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 122–135, Jun Shao, Zhenfu Cao and Peng Liu

    Article first published online : 6 MAY 2009, DOI: 10.1002/sec.109

  18. Performance evaluation of collision avoidance schemes in ad hoc networks

    Security and Communication Networks

    Suryakant Bhandare, Taha Ben Brahim, Saad Biaz and Prathima Agrawal

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.959

  19. Characterizing the greedy behavior in wireless ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 3, March 2011, Pages: 284–298, Soufiene Djahel, Farid Naït-abdesselam and Damla Turgut

    Article first published online : 3 AUG 2010, DOI: 10.1002/sec.210

  20. Self-protecting networking using dynamic p-cycle construction within link capacity constraint

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 689–708, Weiyi Zhang, Farah Kandah, Xiaojiang Du and Chonggang Wang

    Article first published online : 23 AUG 2011, DOI: 10.1002/sec.364