Search Results

There are 6003 results for: content related to: Distributed video coding of secure compressed sensing

  1. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Article first published online : 18 MAY 2011, DOI: 10.1002/sec.328

  2. What you see predicts what you get—lightweight agent-based malware detection

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 33–48, Wei Wang, Ilona Murynets, Jeffrey Bickford, Christopher Van Wart and Gang Xu

    Article first published online : 18 APR 2012, DOI: 10.1002/sec.528

  3. Detecting SYN flooding attacks based on traffic prediction

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1131–1140, Shangguang Wang, Qibo Sun, Hua Zou and Fangchun Yang

    Article first published online : 24 FEB 2012, DOI: 10.1002/sec.428

  4. Privacy and integrity preserving skyline queries in tiered sensor networks

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1177–1188, Jinguo Li, Yaping Lin, Gang Wang, Rui Li and Bo Yin

    Article first published online : 25 JUL 2013, DOI: 10.1002/sec.852

  5. Mechanisms to locate noncooperative transmitters in wireless networks based on residual signal strengths

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1788–1804, Éric Barthélémy and Jean-Marc Robert

    Article first published online : 24 OCT 2013, DOI: 10.1002/sec.877

  6. Efficient and secure chaotic S-Box for wireless sensor network

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 279–292, Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Danièle Fournier-Prunaret and Mounir Samet

    Article first published online : 28 FEB 2013, DOI: 10.1002/sec.728

  7. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  8. Population balance model: Breakage kernel parameter estimation to emulsification data

    The Canadian Journal of Chemical Engineering

    Volume 92, Issue 6, June 2014, Pages: 1082–1099, Jannike Solsvik, Per J. Becker, Nida Sheibat-Othman and Hugo A. Jakobsen

    Article first published online : 8 NOV 2013, DOI: 10.1002/cjce.21928

  9. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  10. An efficient fair UC-secure protocol for two-party computation

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1253–1263, Ou Ruan, Jing Chen, Jing Zhou, Yongquan Cui and Mingwu Zhang

    Article first published online : 26 JUL 2013, DOI: 10.1002/sec.857

  11. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540

  12. Efficient and fault-diagnosable authentication architecture for AMI in smart grid

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 598–616, Depeng Li, Zeyar Aung, John R. Williams and Abel Sanchez

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1006

  13. TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 245–264, Mehran S. Fallah and Nafiseh Kahani

    Article first published online : 14 FEB 2013, DOI: 10.1002/sec.725

  14. Fast authentication mechanism with provable correctness for cluster-based VANETs

    Security and Communication Networks

    Volume 7, Issue 6, June 2014, Pages: 1016–1030, Jung-San Lee and Ya-Chieh Huang

    Article first published online : 14 JUN 2013, DOI: 10.1002/sec.818

  15. Parallelizable MAC revisited

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1115–1127, Wun-She Yap, Sze Ling Yeo, Swee-Huay Heng and Matt Henricksen

    Article first published online : 10 JUL 2013, DOI: 10.1002/sec.842

  16. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1192

  17. Secure group and multi-layer group communication schemes based on polynomial interpolation

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 735–756, Purushothama B. R. and B. B. Amberker

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.607

  18. Client cloud Web service: reducing traffic consumption

    Security and Communication Networks

    Jung Ha Paik, Kwantae Cho, Boo Geum Jung and Dong Hoon Lee

    Article first published online : 5 JUN 2012, DOI: 10.1002/sec.544

  19. Balanced double subset difference broadcast encryption scheme

    Security and Communication Networks

    Shyh-Yih Wang, Wu-Chuan Yang and Ying-Jen Lin

    Article first published online : 5 AUG 2014, DOI: 10.1002/sec.1093

  20. On downlink power allocation for multiuser variable-bit-rate video streaming

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 485–497, Yingsong Huang, Shiwen Mao and Yihan Li

    Article first published online : 9 NOV 2012, DOI: 10.1002/sec.642