Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Journal
    Name: Security and Communication Networks
    Year: 2013
    Volume: 6
    Number: 1
    DBLP: db/journals/scn/scn6.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 134  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Tzung-Her Chen, Bing-Jian Wang, Tai-Yuan Tu, Chih-Hung Wang.
    A security-enhanced key agreement protocol based on chaotic maps.
    Security and Communication Networks 2013, Volume 6 (0) 2013
    Journal article
    Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Fagen Li.
    Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model.
    Security and Communication Networks 2013, Volume 6 (0) 2013
    Journal article
    Zi-Yao Cheng, Yun Liu, Chin-Chen Chang, Shih-Chang Chang.
    Authenticated RFID security mechanism based on chaotic maps.
    Security and Communication Networks 2013, Volume 6 (0) 2013
    Journal article
    Tao Gong, Bharat Bhargava.
    Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model.
    Security and Communication Networks 2013, Volume 6 (0) 2013
    Journal article
    Hoda Jannati, Mahmoud Salmasizadeh, Javad Mohajeri, Amir Moradi 0001.
    Introducing proxy zero-knowledge proof and utilization in anonymous credential systems.
    Security and Communication Networks 2013, Volume 6 (0) 2013
    Journal article
    Emmanouil Magkos, Markos Avlonitis, Panayiotis Kotzanikolaou, Michalis Stefanidakis.
    Toward early warning against Internet worms based on critical-sized networks.
    Security and Communication Networks 2013, Volume 6 (0) 2013
    Journal article
    Haitham S. Al-Sinani, Chris J. Mitchell.
    Enabling interoperation between Shibboleth and Information Card systems.
    Security and Communication Networks 2013, Volume 6 (0) 2013
    Journal article
    Wei Wang, Ilona Murynets, Jeffrey Bickford, Christopher Van Wart, Gang Xu.
    What you see predicts what you get - lightweight agent-based malware detection.
    Security and Communication Networks 2013, Volume 6 (0) 2013
    Journal article
    Hsing-Chung Chen.
    Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy.
    Security and Communication Networks 2013, Volume 6 (0) 2013
    Journal article
    Xixiang Lv, Hui Li, Baocang Wang.
    Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks.
    Security and Communication Networks 2013, Volume 6 (0) 2013
    Show item 1 to 10 of 134  

    Your query returned 134 matches in the database.