Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             36 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Context Adaptive Intrusion Detection System for MANET Cheng, Bo-Chao
2011
34 3 p. 310-318
9 p.
artikel
2 An AAA scheme using ID-based ticket with anonymity in future mobile communication Moon, Jong Sik
2011
34 3 p. 295-304
10 p.
artikel
3 An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks Xu, Jing
2011
34 3 p. 319-325
7 p.
artikel
4 An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes Youn, Taek-Young
2011
34 3 p. 353-357
5 p.
artikel
5 Anonymity analysis of P2P anonymous communication systems Zhang, Jia
2011
34 3 p. 358-366
9 p.
artikel
6 An RFID secure authentication mechanism in WLAN Guo, Ming-Huang
2011
34 3 p. 236-240
5 p.
artikel
7 A strong user authentication scheme with smart cards for wireless communications He, Daojing
2011
34 3 p. 367-374
8 p.
artikel
8 Attribute-based authentication for multi-agent systems with dynamic groups Zhang, Qi
2011
34 3 p. 436-446
11 p.
artikel
9 Can internet users protect themselves? Challenges and techniques of automated protection of HTTP communication Völker, Lars
2011
34 3 p. 457-467
11 p.
artikel
10 Certificateless multi-proxy signature Jin, Zhengping
2011
34 3 p. 344-352
9 p.
artikel
11 Clustering botnet communication traffic based on n-gram feature selection Lu, Wei
2011
34 3 p. 502-514
13 p.
artikel
12 Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’ Khan, Muhammad Khurram
2011
34 3 p. 305-309
5 p.
artikel
13 Defending RFID authentication protocols against DoS attacks Duc, Dang Nguyen
2011
34 3 p. 384-390
7 p.
artikel
14 Design and implementation of a public key-based group collaboration system Clarke, Dwaine
2011
34 3 p. 407-422
16 p.
artikel
15 DoS attacks exploiting signaling in UMTS and IMS Kambourakis, Georgios
2011
34 3 p. 226-235
10 p.
artikel
16 IFC - Editorial Board 2011
34 3 p. IFC-
1 p.
artikel
17 Improvement of a proxy multi-signature scheme without random oracles Sun, Ying
2011
34 3 p. 257-263
7 p.
artikel
18 Improvement of the RFID authentication scheme based on quadratic residues Yeh, Tzu-Chang
2011
34 3 p. 337-341
5 p.
artikel
19 Location privacy and resilience in wireless sensor networks querying Di Pietro, Roberto
2011
34 3 p. 515-523
9 p.
artikel
20 Novel access and remediation scheme in hierarchical trusted network Wang, Jian
2011
34 3 p. 375-383
9 p.
artikel
21 PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks Yeh, Lo-Yao
2011
34 3 p. 447-456
10 p.
artikel
22 Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks Baig, Z.A.
2011
34 3 p. 468-484
17 p.
artikel
23 P2P soft security: On evolutionary dynamics of P2P incentive mechanism Wang, Yufeng
2011
34 3 p. 241-249
9 p.
artikel
24 Privacy addressing and autoconfiguration for mobile ad hoc networks Li, Longjiang
2011
34 3 p. 423-428
6 p.
artikel
25 Provably secure multi-proxy signature scheme with revocation in the standard model Liu, Zhenhua
2011
34 3 p. 494-501
8 p.
artikel
26 Reputation-based role assignment for role-based access control in wireless sensor networks Misra, Sudip
2011
34 3 p. 281-294
14 p.
artikel
27 Robust authentication and key agreement scheme preserving the privacy of secret key Wang, Ren-Chiun
2011
34 3 p. 274-280
7 p.
artikel
28 Robust one-time password authentication scheme using smart card for home network environment Vaidya, Binod
2011
34 3 p. 326-336
11 p.
artikel
29 Scheduling security-critical multimedia applications in heterogeneous networks Zhou, Liang
2011
34 3 p. 429-435
7 p.
artikel
30 Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value Cho, Jung-Sik
2011
34 3 p. 391-397
7 p.
artikel
31 Special issue of computer communications on information and future communication security Park, Jong Hyuk
2011
34 3 p. 223-225
3 p.
artikel
32 The design of RFID access control protocol using the strategy of indefinite-index and challenge-response Chen, Yu-Yi
2011
34 3 p. 250-256
7 p.
artikel
33 The improvement of the knapsack cipher Pham, The Anh
2011
34 3 p. 342-343
2 p.
artikel
34 TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks Oliveira, Leonardo B.
2011
34 3 p. 485-493
9 p.
artikel
35 Trust management in ubiquitous computing: A Bayesian approach Denko, Mieso K.
2011
34 3 p. 398-406
9 p.
artikel
36 VRSS: A new system for rating and scoring vulnerabilities Liu, Qixu
2011
34 3 p. 264-273
10 p.
artikel
                             36 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland