معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(872)
نوع البيانات
مقالات
(872)
اللغة
الإنجليزية
(872)
الدولة
مصر
(872)
المصدر
Security and Communication Networks
(872)
الفترة:
نتائج البحث
(
801
-
850
من
872
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks
By: Pradhan, Anita; Swain, Gandharba; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model
By: Zhou, Guomin; Yuan, Xiaohui; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-7, 7 p.
مقالات
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks
By: Li, Song; Cui, Jie; He, Qiang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
مقالات
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card
By: Wang, Chenyu; Xu, Guoai; Barenghi, Alessandro. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data
By: Xiangyang, Zhu; Dai, Hua; Yang, Geng…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
مقالات
Building Secure Public Key Encryption Scheme from Hidden Field Equations
By: Ping, Yuan; Wang, Baocang; Ye, Dengpan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-6, 6 p.
مقالات
NFC Secure Payment and Verification Scheme with CS E-Ticket
By: Zhu, Haojin; Li, Hui; Yang, Yintang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Cybersecurity Vulnerability Analysis of the PLC PRIME Standard
By: Seijo Simó, Miguel; López López, Gregorio; Zeadally, Sherali…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-18, 18 p.
مقالات
Automatic Reverse Engineering of Private Flight Control Protocols of UAVs
By: Ji, Ran; Tang, Chaojing; Li, Ruilin…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Quantitative Method for Network Security Situation Based on Attack Prediction
By: Hu, Hao; Zhang, Hongqi; Liu, Yuling…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-19, 19 p.
مقالات
Adaptive Security of Broadcast Encryption, Revisited
By: Zhu, Bingxin; Wei, Puwen; Wang, Mingqiang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
مقالات
Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage
By: Partala, Juha; Li, Huaizhi. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Design and Analysis of Self-Healing Tree-Based Hybrid Spectral Amplitude Coding OCDMA System
By: Imtiaz, Waqas A.; Qamar, Affaq; Conti, Vincenzo…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
Privacy Preserved Self-Awareness on the Community via Crowd Sensing
By: Fan, Huiting; Xing, Kai; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
مقالات
CLAS: A Novel Communications Latency Based Authentication Scheme
By: Dou, Zuochao; Khalil, Issa; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-20, 20 p.
مقالات
Group Authentication with Multiple Trials and Multiple Authentications
By: Chien, Hung-Yu; Del Rey, Ángel Martín. Security and Communication Networks. No. 2017 (2017), pp.1-7, 7 p.
مقالات
SCPR: Secure Crowdsourcing-Based Parking Reservation System
By: Wan, Changsheng; Zhang, Juan; Huang, Daoli…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices
By: Quax, Peter; Lamotte, Wim; Lorenz, Pascal…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-21, 21 p.
مقالات
Efficient Solutions to Two-Party and Multiparty Millionaires’ Problem
By: Liu, Xin; Li, Shundong; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners
By: Alsaleh, Mansour; Alomar, Noura; Al-Salman, Abdulmalik S.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
PMCAP: A Threat Model of Process Memory Data on the Windows Operating System
By: Pan, Jiaye; Zhuang, Yi; Du, Xiaojiang. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
A Survey on Secure Wireless Body Area Networks
By: Zou, Shihong; Chen, Shanzhi; Lu, Rongxing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection
By: Zheng, Kangfeng; Niu, Xinxin; Peris-Lopez, P.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service
By: Gui, Xiaolin; An, Jian; Tian, Feng…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems
By: Zhao, Ju-min; Li, Deng-ao; Rannenberg, Kai…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
An Efficient Context-Aware Privacy Preserving Approach for Smartphones
By: Zhang, Lichen; Li, Yingshu; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
RFA: R-Squared Fitting Analysis Model for Power Attack
By: Wang, An; Zhu, Liehuang; Du, Xiaojiang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
مقالات
Identification of ICS Security Risks toward the Analysis of Packet Interaction Characteristics Using State Sequence Matching Based on SF-FSM
By: Xu, Jianxin; Feng, Dongqin; Alazab, Mamoun. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
مقالات
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing
By: Hussain, Mohammed Abdulridha; Jin, Hai; Lorenz, Pascal…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications
By: Shehada, Dina; al-Qutayri, Mahmoud A.; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-18, 18 p.
مقالات
Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection
By: Kim, Sang-Pil; Gil, Myeong-Sun; Choi, Mi-Jung…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks
By: Liu, Lan; Ko, Ryan K. L.; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
مقالات
New Hybrid Features Selection Method: A Case Study on Websites Phishing
By: Rajab, Khairan D.; Khan, Muhammad Khurram. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party
By: Hua, Jingyu; Tang, An; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
A Secured Load Mitigation and Distribution Scheme for Securing SIP Server
By: Ganesan, Vennila; Masucci, Barbara; MSK, Manikandan. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud
By: Gan, Qingqing; Wang, Xiaoming; Wu, Daini…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Differential Privacy for Edge Weights in Social Networks
By: Li, Xiaoye; Yang, Jing; Zhang, Jianpei…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks
By: Li, Peng; Xu, He; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
A Privacy Model for RFID Tag Ownership Transfer
By: Yang, Xingchun; Xu, Chun-xiang; Khan, Muhammad Khurram…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo
By: Han, Guoyong; Zhang, Wenying; Nasser, Nidal. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information
By: Soria-Lorente, A.; Berres, S.; Masucci, Barbara. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents
By: Tsai, Chien-Hua; Antonopoulos, Angelos; Su, Pin-Chang. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks
By: Zhao, Zheng; Liu, Fenlin; Di Pietro, Roberto…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
Optimization of a Blind Speech Watermarking Technique against Amplitude Scaling
By: Nematollahi, Mohammad Ali; Vorakulpipat, Chalee; Gamboa-Rosales, Hamurabi…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications
By: Dalai, Asish Kumar; Choo, Kim-Kwang Raymond; Jena, Sanjay Kumar. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
The Performance Evaluation of an IEEE 802.11 Network Containing Misbehavior Nodes under Different Backoff Algorithms
By: Hoang, Trong-Minh; Bui, Van-Kien; Gringoli, Francesco…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
مقالات
Protecting Information with Subcodstanography
By: Köhler, Mirko; Lukić, Ivica; Križanović Čik, Višnja…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker
By: Wazan, Ahmad Samer; Laborde, Romain; Masucci, Barbara…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-23, 23 p.
مقالات
Certificateless Public Auditing Protocol with Constant Verification Time
By: Kim, Dongmin; Jeong, Ik Rae; Khan, Muhammad Khurram. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
Dynamic Rule Encryption for Mobile Payment
By: Husni, Emir; Del Rey, Ángel Martín. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
«
9
10
11
12
13
14
15
16
17
18
»