Search Results

There are 155006 results for: content related to: Energy efficient comparator for successive approximation register ADCs with application to encryption schemes in wireless communication

  1. Privacy in the Internet of Things: threats and challenges

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2728–2742, Jan Henrik Ziegeldorf, Oscar Garcia Morchon and Klaus Wehrle

    Version of Record online : 10 JUN 2013, DOI: 10.1002/sec.795

  2. On collaborative anonymous communications in lossy networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2761–2777, David Rebollo-Monedero, Jordi Forné, Esteve Pallarès, Javier Parra-Arnau, Carolina Tripp, Luis Urquiza and Mónica Aguilar

    Version of Record online : 17 MAY 2013, DOI: 10.1002/sec.793

  3. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 11 MAY 2011, DOI: 10.1002/sec.324

  4. Secure and efficient data collection in wireless image sensor network based on ellipse batch dispersive routing

    Security and Communication Networks

    Volume 8, Issue 14, 25 September 2015, Pages: 2420–2430, Sheng Su and Haijie Yu

    Version of Record online : 24 MAY 2013, DOI: 10.1002/sec.792

  5. A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic

    Security and Communication Networks

    Volume 7, Issue 10, October 2014, Pages: 1612–1621, Sang-soo Choi, Jungsuk Song, Seokhun Kim and Sookyun Kim

    Version of Record online : 24 MAY 2013, DOI: 10.1002/sec.796

  6. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.374

  7. Comprehensive analysis of the authentication methods in wireless body area networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4777–4803, Mohammad Masdari and Safiyeh Ahmadzadeh

    Version of Record online : 17 OCT 2016, DOI: 10.1002/sec.1642

  8. Analysis of the current state in website certificate validation

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 865–877, Nils Gruschka, Luigi Lo Iacono and Christoph Sorge

    Version of Record online : 11 JUL 2013, DOI: 10.1002/sec.799

  9. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  10. Accountability using flow-net: design, implementation, and performance evaluation

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 29–49, Yang Xiao, Ke Meng and Daisuke Takahashi

    Version of Record online : 16 JUN 2011, DOI: 10.1002/sec.348

  11. Software-defined networking (SDN): a survey

    Security and Communication Networks

    Kamal Benzekki, Abdeslam El Fergougui and Abdelbaki Elbelrhiti Elalaoui

    Version of Record online : 7 FEB 2017, DOI: 10.1002/sec.1737

  12. Research Trends in Security and DDoS in SDN

    Security and Communication Networks

    Neelam Dayal, Prasenjit Maity, Shashank Srivastava and Rahamatullah Khondoker

    Version of Record online : 9 FEB 2017, DOI: 10.1002/sec.1759

  13. Modeling and formal verification of smart environments

    Security and Communication Networks

    Volume 7, Issue 10, October 2014, Pages: 1582–1598, Fulvio Corno and Muhammad Sanaullah

    Version of Record online : 29 MAY 2013, DOI: 10.1002/sec.794

  14. A survey and taxonomy of DoS attacks in cloud computing

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3724–3751, Mohammad Masdari and Marzie Jalali

    Version of Record online : 13 JUL 2016, DOI: 10.1002/sec.1539

  15. A survey of lightweight stream ciphers for embedded systems

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1226–1246, Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis and Yannis Papaefstathiou

    Version of Record online : 21 DEC 2015, DOI: 10.1002/sec.1399

  16. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  17. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  18. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.911

  19. Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems

    Security and Communication Networks

    Hamed Orojloo and Mohammad Abdollahi Azgomi

    Version of Record online : 3 FEB 2017, DOI: 10.1002/sec.1761

  20. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.915