Search Results

There are 17898 results for: content related to: Mechanisms to locate noncooperative transmitters in wireless networks based on residual signal strengths

  1. Distributed access control with adaptive privacy preserving property for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 759–773, Changsha Ma, Kaiping Xue and Peilin Hong

    Article first published online : 30 APR 2013, DOI: 10.1002/sec.777

  2. Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 509–522, Szymon Szott, Marek Natkaniec and Andrzej R. Pach

    Article first published online : 10 DEC 2012, DOI: 10.1002/sec.677

  3. CSP-DHIES: a new public-key encryption scheme from matrix conjugation

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 809–822, Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li and Yixian Yang

    Article first published online : 3 OCT 2011, DOI: 10.1002/sec.376

  4. Design of secure access control scheme for personal health record-based cloud healthcare service

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1332–1346, Chia-Hui Liu, Fong-Qi Lin, Chin-Sheng Chen and Tzer-Shyong Chen

    Article first published online : 8 AUG 2014, DOI: 10.1002/sec.1087

  5. Privacy and integrity preserving skyline queries in tiered sensor networks

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1177–1188, Jinguo Li, Yaping Lin, Gang Wang, Rui Li and Bo Yin

    Article first published online : 25 JUL 2013, DOI: 10.1002/sec.852

  6. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  7. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540

  8. Secure group and multi-layer group communication schemes based on polynomial interpolation

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 735–756, Purushothama B. R. and B. B. Amberker

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.607

  9. Client cloud Web service: reducing traffic consumption

    Security and Communication Networks

    Jung Ha Paik, Kwantae Cho, Boo Geum Jung and Dong Hoon Lee

    Article first published online : 5 JUN 2012, DOI: 10.1002/sec.544

  10. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1192

  11. Balanced double subset difference broadcast encryption scheme

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1447–1460, Shyh-Yih Wang, Wu-Chuan Yang and Ying-Jen Lin

    Article first published online : 5 AUG 2014, DOI: 10.1002/sec.1093

  12. Efficient and fault-diagnosable authentication architecture for AMI in smart grid

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 598–616, Depeng Li, Zeyar Aung, John R. Williams and Abel Sanchez

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1006

  13. You have free access to this content
    Secrecy capacity of wireless channels subject to log-normal fading

    Security and Communication Networks

    Volume 8, Issue 1, 10 January 2015, Pages: 25–35, Xian Liu

    Article first published online : 12 MAR 2013, DOI: 10.1002/sec.752

  14. On downlink power allocation for multiuser variable-bit-rate video streaming

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 485–497, Yingsong Huang, Shiwen Mao and Yihan Li

    Article first published online : 9 NOV 2012, DOI: 10.1002/sec.642

  15. Introducing proxy zero-knowledge proof and utilization in anonymous credential systems

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 161–172, Hoda Jannati, Mahmoud Salmasizadeh, Javad Mohajeri and Amir Moradi

    Article first published online : 18 APR 2012, DOI: 10.1002/sec.543

  16. Protocol Derivation System for the Needham–Schroeder family

    Security and Communication Networks

    Junwei Zhang, Jianfeng Ma and Chao Yang

    Article first published online : 25 JUN 2012, DOI: 10.1002/sec.565

  17. Trust computation for multiple routes recommendation in social network sites

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2258–2276, Bo Zhang, Zhenhua Huang, Jian Yu and Yang Xiang

    Article first published online : 10 JAN 2014, DOI: 10.1002/sec.935

  18. Efficient authentication and access control of scalable multimedia streams over packet-lossy networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 611–625, Robert H. Deng, Xuhua Ding and Swee-Won Lo

    Article first published online : 21 MAR 2013, DOI: 10.1002/sec.762

  19. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  20. Discovering AODV-based multipath routes in wireless ad hoc networks

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 374–383, Gang Li and Hongmei Sun

    Article first published online : 31 MAY 2011, DOI: 10.1002/sec.322