Search Results

There are 2989 results for: content related to: Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards

  1. A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems

    Security and Communication Networks

    Wenfang Zhang, Xiaomin Wang and Muhammad Khurram Khan

    Article first published online : 10 JUN 2014, DOI: 10.1002/sec.1051

  2. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Rajeev Singh and Teek Parval Sharma

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1079

  3. Comparative study of trust and reputation systems for wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 669–688, Osman Khalid, Samee U. Khan, Sajjad A. Madani, Khizar Hayat, Majid I. Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally and Dan Chen

    Article first published online : 5 JUL 2012, DOI: 10.1002/sec.597

  4. Context-aware usage control for web of things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2696–2712, Guangdong Bai, Lin Yan, Liang Gu, Yao Guo and Xiangqun Chen

    Article first published online : 15 FEB 2012, DOI: 10.1002/sec.424

  5. For your phone only: custom protocols for efficient secure function evaluation on mobile devices

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1165–1176, Henry Carter, Chaitrali Amrutkar, Italo Dacosta and Patrick Traynor

    Article first published online : 23 JUL 2013, DOI: 10.1002/sec.851

  6. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  7. Attack modelling and security evaluation based on stochastic activity networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 714–737, Ali Sedaghatbaf and Mohammad Abdollahi Azgomi

    Article first published online : 26 APR 2013, DOI: 10.1002/sec.774

  8. Policy override in practice: model, evaluation, and decision support

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 139–156, Steffen Bartsch

    Article first published online : 16 MAY 2012, DOI: 10.1002/sec.547

  9. Evaluating and selecting the biometrics in network security

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 727–739, Che-Hung Liu, Jen-Sheng Wang, Chih-Chiang Peng and Joseph Z. Shyu

    Article first published online : 3 JUL 2014, DOI: 10.1002/sec.1020

  10. Cipher feedback mode under go-back-N and selective-reject protocols in error channels

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 942–954, Xiannuan Liang, Yang Xiao, Suat Ozdemir, Athanasios V. Vasilakos and Hongmei Deng

    Article first published online : 12 OCT 2012, DOI: 10.1002/sec.638

  11. A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 261–283, Mostafa Mohammadpourfard, Mohammad Ali Doostari, Mohammad Bagher Ghaznavi Ghoushchi and Nafiseh Shakiba

    Article first published online : 12 MAR 2014, DOI: 10.1002/sec.978

  12. A two-factor authentication scheme with anonymity for multi-server environments

    Security and Communication Networks

    Chi-Tung Chen and Cheng-Chi Lee

    Article first published online : 5 SEP 2014, DOI: 10.1002/sec.1109

  13. Toward early warning against Internet worms based on critical-sized networks

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 78–88, Emmanouil Magkos, Markos Avlonitis, Panayiotis Kotzanikolaou and Michalis Stefanidakis

    Article first published online : 21 MAR 2012, DOI: 10.1002/sec.534

  14. Anomaly detection and response approach based on mapping requests

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2277–2292, Ming Wan, Hong-Ke Zhang, Tin-Yu Wu and Chi-Hsiang Lo

    Article first published online : 10 JAN 2014, DOI: 10.1002/sec.937

  15. SCADA communication and security issues

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 175–194, Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao, Wei Liang and C. L. Philip Chen

    Article first published online : 24 JAN 2013, DOI: 10.1002/sec.698

  16. Balanced key tree management for multi-privileged groups using (N, T) policy

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 545–555, Muthulakshmi Angamuthu and Anitha Ramalingam

    Article first published online : 25 JUL 2011, DOI: 10.1002/sec.351

  17. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Article first published online : 18 MAY 2011, DOI: 10.1002/sec.328

  18. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Article first published online : 11 MAY 2011, DOI: 10.1002/sec.324

  19. A survey of accountability in computer networks and distributed systems

    Security and Communication Networks

    Zhifeng Xiao, Nandhakumar Kathiresshan and Yang Xiao

    Article first published online : 21 JUN 2012, DOI: 10.1002/sec.574

  20. BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 123–138, Alper Kanak and Ibrahim Sogukpinar

    Article first published online : 5 OCT 2012, DOI: 10.1002/sec.626