Search Results

There are 12029 results for: content related to: A game inspired defense mechanism against distributed denial of service attacks

  1. You have full text access to this Open Access content
    Reliability enhancement for CIR-based physical layer authentication

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 661–671, Jiazi Liu, Ahmed Refaey, Xianbin Wang and Helen Tang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1014

  2. You have full text access to this Open Access content
    Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1698–1716, Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827

  3. You have full text access to this Open Access content
    A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.878

  4. Mathematical analysis of a model describing the number of antibiotic resistant bacteria in a polluted river

    Mathematical Methods in the Applied Sciences

    Volume 37, Issue 13, July 2014, Pages: 1956–1973, I.M.  Mostefaoui

    Version of Record online : 5 AUG 2013, DOI: 10.1002/mma.2949

  5. You have full text access to this Open Access content
    Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 343–359, Cristina Rottondi, Marco Savi, Giacomo Verticale and Christoph Krauß

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.983

  6. You have full text access to this Open Access content
    A more secure and efficient Andrew Secure RPC protocol

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2063–2077, Sirapat Boonkrong

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.918

  7. You have full text access to this Open Access content
    Yet another attack on the chinese remainder theorem-based hierarchical access control scheme

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1079–1095, Niu Liu, Shaohua Tang and Lingling Xu

    Version of Record online : 5 JUL 2013, DOI: 10.1002/sec.837

  8. You have full text access to this Open Access content
    A new efficient signcryption scheme in the standard model

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 778–789, Zheng Yang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1034

  9. You have full text access to this Open Access content
    On false data injection attacks against Kalman filtering in power system dynamic state estimation

    Security and Communication Networks

    Volume 9, Issue 9, June 2016, Pages: 833–849, Qingyu Yang, Liguo Chang and Wei Yu

    Version of Record online : 27 AUG 2013, DOI: 10.1002/sec.835

  10. You have full text access to this Open Access content
    Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1843–1863, Yanfei Guo and Zhenfeng Zhang

    Version of Record online : 27 AUG 2013, DOI: 10.1002/sec.868

  11. You have full text access to this Open Access content
    Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.940

  12. You have full text access to this Open Access content
    An efficient batch verification system and its effect in a real time VANET environment

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 298–310, Jiageng Chen, Mohammad Saiful Islam Mamun and Atsuko Miyaji

    Version of Record online : 18 MAR 2014, DOI: 10.1002/sec.980

  13. You have full text access to this Open Access content
    A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1036

  14. You have full text access to this Open Access content
    One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1796–1809, Dennis Y. W. Liu and Duncan S. Wong

    Version of Record online : 4 JUL 2013, DOI: 10.1002/sec.812

  15. You have full text access to this Open Access content
    An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 245–260, Lili Xu and Fan Wu

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.977

  16. You have full text access to this Open Access content
    Authenticated key exchange with synchronized state

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2373–2388, Zheng Yang and Fei Guo

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.948

  17. You have full text access to this Open Access content
    n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 550–564, Zhengan Huang, Shengli Liu and Kefei Chen

    Version of Record online : 4 APR 2014, DOI: 10.1002/sec.1002

  18. You have full text access to this Open Access content
    On cross-correlation properties of S-boxes and their design using semi-bent functions

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 790–800, Enes Pasalic, Samed Bajrić and Milan Djordjević

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1035

  19. You have full text access to this Open Access content
    A new multi-use multi-secret sharing scheme based on the duals of minimal linear codes

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 202–211, Yun Song, Zhihui Li, Yongming Li and Jing Li

    Version of Record online : 19 MAR 2014, DOI: 10.1002/sec.972

  20. You have full text access to this Open Access content
    Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2003–2014, Masoumeh Javanbakht, Hossein Erfani, Hamid Haj Seyyed Javadi and Parisa Daneshjoo

    Version of Record online : 10 JAN 2014, DOI: 10.1002/sec.914