Search Results

There are 9506 results for: content related to: Obtaining K -obfuscation for profile privacy in social networks

  1. Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 216–238, Suleyman Kondakci and Cemali Dincer

    Article first published online : 5 JAN 2011, DOI: 10.1002/sec.287

  2. RFID system for public train transportation

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 557–571, Chin-Ling Chen and Mei-Li Chong

    Article first published online : 5 NOV 2010, DOI: 10.1002/sec.260

  3. Secrecy coding for the binary symmetric wiretap channel

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 966–978, Yanling Chen and A. J. Han Vinck

    Article first published online : 8 SEP 2010, DOI: 10.1002/sec.230

  4. Performance of the verification for binary memoryless channels

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1212–1225, Vladimir B. Balakirsky and A. J. Han Vinck

    Article first published online : 8 NOV 2010, DOI: 10.1002/sec.263

  5. Cryptosystems based on continued fractions

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1199–1211, Ali Kanso

    Article first published online : 3 DEC 2010, DOI: 10.1002/sec.255

  6. Performance evaluation of collision avoidance schemes in ad hoc networks

    Security and Communication Networks

    Suryakant Bhandare, Taha Ben Brahim, Saad Biaz and Prathima Agrawal

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.959

  7. XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1420–1444, Devrim Unal and M. Ufuk Caglayan

    Article first published online : 27 JAN 2012, DOI: 10.1002/sec.411

  8. A non-associative lattice-based public key cryptosystem

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 145–163, Ehsan Malekian and Ali Zakerolhosseini

    Article first published online : 2 FEB 2011, DOI: 10.1002/sec.297

  9. An elliptic curve secret sharing key management scheme for mobile ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1405–1419, Hisham Dahshan and James Irvine

    Article first published online : 10 MAR 2011, DOI: 10.1002/sec.270

  10. Coloring networks for attacker identification and response

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 751–768, Ashok Singh Sairam, Sangita Roy and Rishikesh Sahay

    Article first published online : 19 JUL 2014, DOI: 10.1002/sec.1022

  11. Analysis and control stratagems of flash disk virus dynamic propagation model

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 226–235, Cong Jin and Xiao-Yan Wang

    Article first published online : 15 FEB 2011, DOI: 10.1002/sec.310

  12. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Jin Cao, Maode Ma and Hui Li

    Article first published online : 22 APR 2015, DOI: 10.1002/sec.1252

  13. A stochastic learning automata-based solution for intrusion detection in vehicular ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 666–677, Sudip Misra, P. Venkata Krishna and Kiran Isaac Abraham

    Article first published online : 9 JUN 2010, DOI: 10.1002/sec.200

  14. Cardioids-based faster authentication and diagnosis of remote cardiovascular patients

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1351–1368, Fahim Sufi, Ibrahim Khalil and Ibrahim Habib

    Article first published online : 16 MAR 2011, DOI: 10.1002/sec.262

  15. Key splitting: making random key distribution schemes resistant against node capture

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 431–445, Mohammad Ehdaie, Nikos Alexiou, Mahmoud Ahmadian Attari, Mohammad Reza Aref and Panos Papadimitratos

    Article first published online : 31 MAR 2014, DOI: 10.1002/sec.991

  16. A self-stabilized random access protocol against denial of service attack in wireless networks

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 1075–1087, Jahangir H. Sarker and Hussein T. Mouftah

    Article first published online : 3 DEC 2010, DOI: 10.1002/sec.248

  17. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 929–943, Arpan Roy, Dong Seong Kim and Kishor S. Trivedi

    Article first published online : 2 FEB 2011, DOI: 10.1002/sec.299

  18. Avoidance of misbehaving nodes in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1096–1114, Tal Grinshpoun, Amnon Meisels and Eyal Felstaine

    Article first published online : 22 JUL 2013, DOI: 10.1002/sec.841

  19. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Article first published online : 20 FEB 2014, DOI: 10.1002/sec.955

  20. SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 122–135, Jun Shao, Zhenfu Cao and Peng Liu

    Article first published online : 6 MAY 2009, DOI: 10.1002/sec.109