Abstract
No abstract available.
Cited By
- Maram B, Gnanasekar J, Manogaran G and Balaanand M (2019). Intelligent security algorithm for UNICODE data privacy and security in IOT, Service Oriented Computing and Applications, 13:1, (3-15), Online publication date: 1-Mar-2019.
- (2019). A novel method for network intrusion detection based on nonlinear SNE and SVM, International Journal of Artificial Intelligence and Soft Computing, 6:4, (265-286), Online publication date: 1-Jan-2018.
- Tao X, Li G, Sun D and Cai H (2017). A game-theoretic model and analysis of data exchange protocols for Internet of Things in clouds, Future Generation Computer Systems, 76:C, (582-589), Online publication date: 1-Nov-2017.
- Gupta S and Kumar P (2017). Profile and Back Off Based Distributed NIDS in Cloud, Wireless Personal Communications: An International Journal, 94:4, (2879-2900), Online publication date: 1-Jun-2017.
- Kang J, Park G and Park J (2016). Design of secure authentication scheme between devices based on zero-knowledge proofs in home automation service environments, The Journal of Supercomputing, 72:11, (4319-4336), Online publication date: 1-Nov-2016.
- Carrara B and Adams C A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, (115-126)
- Abuzneid A, Sobh T and Faezipour M (2018). An enhanced communication protocol for location privacy in WSN, International Journal of Distributed Sensor Networks, 2015, (62-62), Online publication date: 1-Jan-2015.
- Yu W, Griffith D, Ge L, Bhattarai S and Golmie N (2015). An integrated detection system against false data injection attacks in the Smart Grid, Security and Communication Networks, 8:2, (91-109), Online publication date: 25-Jan-2015.
- Ye L, Fodor V, Giannetsos T and Papadimitratos P Path Metric Authentication for Low-Power and Lossy Networks Proceedings of the 1st ACM International Workshop on Cyber-Physical Systems for Smart Water Networks, (1-6)
- Dolev S and Kopeetsky M (2012). Anonymous transactions in computer networks, ACM Transactions on Autonomous and Adaptive Systems, 7:2, (1-14), Online publication date: 1-Jul-2012.
- Al-Khashab E, Al-Anzi F and Salman A PSIAQOP Proceedings of the Second Kuwait Conference on e-Services and e-Systems, (1-8)
- Pöhls H and Höhne F The role of data integrity in EU digital signature legislation -- achieving statutory trust for sanitizable signature schemes Proceedings of the 7th international conference on Security and Trust Management, (175-192)
- Huang T, Zeadally S, Chilamkurti N and Shieh C (2010). A programmable network address translator, ACM Transactions on Internet Technology, 10:1, (1-37), Online publication date: 1-Feb-2010.
- Degabriele J and Paterson K On the (in)security of IPsec in MAC-then-encrypt configurations Proceedings of the 17th ACM conference on Computer and communications security, (493-504)
- Wang H, Bai G and Chen H (2010). A Gbps IPSec SSL Security Processor Design and Implementation in an FPGA Prototyping Platform, Journal of Signal Processing Systems, 58:3, (311-324), Online publication date: 1-Mar-2010.
- Chen L, Xie X, Xu Y and Xia D Security analysis and design of a uniform identity authentication system Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication, (174-178)
- Dolev S and Kopeetsky M Anonymous Transactions in Computer Networks Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, (297-310)
- FASLI M (2007). On agent technology for e-commerce, The Knowledge Engineering Review, 22:1, (3-35), Online publication date: 1-Mar-2007.
- Wu H, Lee C, Chen W and Lee T Algorithm of cipher text containing key to produce cipher text transmitted in network security Proceedings of the 6th Conference on 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases - Volume 6, (201-205)
- Ohri J and Dhillon G Optimizing security in e-commerce through implementation of hybird tecnologies Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems, (1-6)
- Panato A, Barcelos M and Reis R A Low Device Occupation IP to Implement Rijndael Algorithm Proceedings of the conference on Design, Automation and Test in Europe: Designers' Forum - Volume 2