nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Context Adaptive Intrusion Detection System for MANET
|
Cheng, Bo-Chao |
|
2011 |
34 |
3 |
p. 310-318 9 p. |
artikel |
2 |
An AAA scheme using ID-based ticket with anonymity in future mobile communication
|
Moon, Jong Sik |
|
2011 |
34 |
3 |
p. 295-304 10 p. |
artikel |
3 |
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
|
Xu, Jing |
|
2011 |
34 |
3 |
p. 319-325 7 p. |
artikel |
4 |
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
|
Youn, Taek-Young |
|
2011 |
34 |
3 |
p. 353-357 5 p. |
artikel |
5 |
Anonymity analysis of P2P anonymous communication systems
|
Zhang, Jia |
|
2011 |
34 |
3 |
p. 358-366 9 p. |
artikel |
6 |
An RFID secure authentication mechanism in WLAN
|
Guo, Ming-Huang |
|
2011 |
34 |
3 |
p. 236-240 5 p. |
artikel |
7 |
A strong user authentication scheme with smart cards for wireless communications
|
He, Daojing |
|
2011 |
34 |
3 |
p. 367-374 8 p. |
artikel |
8 |
Attribute-based authentication for multi-agent systems with dynamic groups
|
Zhang, Qi |
|
2011 |
34 |
3 |
p. 436-446 11 p. |
artikel |
9 |
Can internet users protect themselves? Challenges and techniques of automated protection of HTTP communication
|
Völker, Lars |
|
2011 |
34 |
3 |
p. 457-467 11 p. |
artikel |
10 |
Certificateless multi-proxy signature
|
Jin, Zhengping |
|
2011 |
34 |
3 |
p. 344-352 9 p. |
artikel |
11 |
Clustering botnet communication traffic based on n-gram feature selection
|
Lu, Wei |
|
2011 |
34 |
3 |
p. 502-514 13 p. |
artikel |
12 |
Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’
|
Khan, Muhammad Khurram |
|
2011 |
34 |
3 |
p. 305-309 5 p. |
artikel |
13 |
Defending RFID authentication protocols against DoS attacks
|
Duc, Dang Nguyen |
|
2011 |
34 |
3 |
p. 384-390 7 p. |
artikel |
14 |
Design and implementation of a public key-based group collaboration system
|
Clarke, Dwaine |
|
2011 |
34 |
3 |
p. 407-422 16 p. |
artikel |
15 |
DoS attacks exploiting signaling in UMTS and IMS
|
Kambourakis, Georgios |
|
2011 |
34 |
3 |
p. 226-235 10 p. |
artikel |
16 |
IFC - Editorial Board
|
|
|
2011 |
34 |
3 |
p. IFC- 1 p. |
artikel |
17 |
Improvement of a proxy multi-signature scheme without random oracles
|
Sun, Ying |
|
2011 |
34 |
3 |
p. 257-263 7 p. |
artikel |
18 |
Improvement of the RFID authentication scheme based on quadratic residues
|
Yeh, Tzu-Chang |
|
2011 |
34 |
3 |
p. 337-341 5 p. |
artikel |
19 |
Location privacy and resilience in wireless sensor networks querying
|
Di Pietro, Roberto |
|
2011 |
34 |
3 |
p. 515-523 9 p. |
artikel |
20 |
Novel access and remediation scheme in hierarchical trusted network
|
Wang, Jian |
|
2011 |
34 |
3 |
p. 375-383 9 p. |
artikel |
21 |
PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks
|
Yeh, Lo-Yao |
|
2011 |
34 |
3 |
p. 447-456 10 p. |
artikel |
22 |
Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks
|
Baig, Z.A. |
|
2011 |
34 |
3 |
p. 468-484 17 p. |
artikel |
23 |
P2P soft security: On evolutionary dynamics of P2P incentive mechanism
|
Wang, Yufeng |
|
2011 |
34 |
3 |
p. 241-249 9 p. |
artikel |
24 |
Privacy addressing and autoconfiguration for mobile ad hoc networks
|
Li, Longjiang |
|
2011 |
34 |
3 |
p. 423-428 6 p. |
artikel |
25 |
Provably secure multi-proxy signature scheme with revocation in the standard model
|
Liu, Zhenhua |
|
2011 |
34 |
3 |
p. 494-501 8 p. |
artikel |
26 |
Reputation-based role assignment for role-based access control in wireless sensor networks
|
Misra, Sudip |
|
2011 |
34 |
3 |
p. 281-294 14 p. |
artikel |
27 |
Robust authentication and key agreement scheme preserving the privacy of secret key
|
Wang, Ren-Chiun |
|
2011 |
34 |
3 |
p. 274-280 7 p. |
artikel |
28 |
Robust one-time password authentication scheme using smart card for home network environment
|
Vaidya, Binod |
|
2011 |
34 |
3 |
p. 326-336 11 p. |
artikel |
29 |
Scheduling security-critical multimedia applications in heterogeneous networks
|
Zhou, Liang |
|
2011 |
34 |
3 |
p. 429-435 7 p. |
artikel |
30 |
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
|
Cho, Jung-Sik |
|
2011 |
34 |
3 |
p. 391-397 7 p. |
artikel |
31 |
Special issue of computer communications on information and future communication security
|
Park, Jong Hyuk |
|
2011 |
34 |
3 |
p. 223-225 3 p. |
artikel |
32 |
The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
|
Chen, Yu-Yi |
|
2011 |
34 |
3 |
p. 250-256 7 p. |
artikel |
33 |
The improvement of the knapsack cipher
|
Pham, The Anh |
|
2011 |
34 |
3 |
p. 342-343 2 p. |
artikel |
34 |
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
|
Oliveira, Leonardo B. |
|
2011 |
34 |
3 |
p. 485-493 9 p. |
artikel |
35 |
Trust management in ubiquitous computing: A Bayesian approach
|
Denko, Mieso K. |
|
2011 |
34 |
3 |
p. 398-406 9 p. |
artikel |
36 |
VRSS: A new system for rating and scoring vulnerabilities
|
Liu, Qixu |
|
2011 |
34 |
3 |
p. 264-273 10 p. |
artikel |