e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(155)
Data Type
Journal Articles
(155)
Language
English
(155)
Country
Egypt
(155)
Authors / Persons
Yang, Qing
(11)
Del Rey, Ángel Martín
(10)
Khan, Muhammad Khurram
(10)
Qi, Lianyong
(7)
Choo, Kim-Kwang Raymond
(6)
Du, Xiaojiang
(5)
Li, Huaizhi
(5)
Antonopoulos, Angelos
(4)
Díaz-Verdejo, Jesús
(4)
Hu, Jiankun
(4)
Lorenz, Pascal
(4)
Maiorana, Emanuele
(4)
Yan, Zheng
(4)
Alazab, Mamoun
(3)
Cai, Z.
(3)
Conti, Vincenzo
(3)
Luo, Xiangyang
(3)
Masucci, Barbara
(3)
Qian, Zhenxing
(3)
Wang, Xiaoming
(3)
Zeadally, Sherali
(3)
Zhang, Zonghua
(3)
Show more
Update
Source
Security and Communication Networks
(155)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(155)
Range:
Search Results
(
51
-
100
of
155
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
CHAOS: An SDN-Based Moving Target Defense System
By: Hu, Hongxin; Cai, Z.; Zhao, Bo…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
Journal Articles
Erratum to “An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model”
By: Zhou, Guomin; Yuan, Xiaohui; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-1, 1 p.
Journal Articles
Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability
By: Ren, Yanli; Dong, Min; Niu, Zhihua…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
ABS-TrustSDN: An Agent-Based Simulator of Trust Strategies in Software-Defined Networks
By: García-Magariño, Iván; Lacuesta, Raquel; Li, Huaizhi. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Low-Rate DDoS Attack Detection Using Expectation of Packet Size
By: Zhou, Lu; Yuan, C.; Li, Huaizhi…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
Journal Articles
Fault Attack on the Authenticated Cipher ACORN v2
By: Zhang, Xiaojuan; Antonopoulos, Angelos; Lin, Dongdai…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
Journal Articles
CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy
By: Helil, Nurmamat; Rahman, Kaysar; Li, Huaizhi. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
Journal Articles
How to Share Secret Efficiently over Networks
By: Harn, Lein; Hsu, Chingfang; Peris-Lopez, P.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-6, 6 p.
Journal Articles
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
By: Moon, Jongho; Lee, Youngsook; Won, Dongho…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
Journal Articles
Similarity Digest Search: A Survey and Comparative Analysis of Strategies to Perform Known File Filtering Using Approximate Matching
By: Moia, Vitor Hugo Galhardo; Henriques, Marco Aurélio Amaral; Ribeiro, Bernardete. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
Journal Articles
Authenticated Location-Aware PublishSubscribe Services in Untrusted Outsourced Environments
By: Yan, Han; Cheng, Xiang; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
Journal Articles
Deniable Key Establishment Resistance against eKCI Attacks
By: Krzywiecki, Łukasz; Conti, Vincenzo; Wlisłocki, Tomasz. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
Journal Articles
The Concept Drift Problem in Android Malware Detection and Its Solution
By: Hu, Donghui; Ma, Zhongjin; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
Journal Articles
Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration
By: Dong, Jiankuo; Zheng, Fangyu; Pan, Wuqiong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
Journal Articles
Relay Selections for Security and Reliability in Mobile Communication Networks over Nakagami-m Fading Channels
By: Huang, Hongji; Sun, Wanyou; Han, Guangjie…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
Journal Articles
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity
By: Han, Gang; Zheng, Dong; Garcia-Teodoro, P.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking
By: Ma, Rong; Cao, Zhenfu; Challal, Yacine…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
New Linear Cryptanalysis of Chinese Commercial Block Cipher Standard SM4
By: Liu, Yu; Liang, Huicong; Wang, Wei…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
A Novel Design of Membership Authentication and Group Key Establishment Protocol
By: Harn, Lein; Hsu, Chingfang; Del Rey, Ángel Martín. Security and Communication Networks. No. 2017 (2017), pp.1-7, 7 p.
Journal Articles
Improvements for Finding Impossible Differentials of Block Cipher Structures
By: Luo, Yiyuan; Díaz-Verdejo, Jesús; Lai, Xuejia. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Efficient Secure Multiparty Subset Computation
By: Zhou, Sufang; Li, Shundong; Liu, Xin…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
Journal Articles
Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion
By: Zhang, Dafang; Su, Xin; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
Journal Articles
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems
By: Pereira, Geovandro C. C. F.; Alves, Renan C. A.; Silva, Felipe L. da…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
Journal Articles
Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems
By: Shen, Jiajun; Antonopoulos, Angelos; Feng, Dongqin. Security and Communication Networks. No. 2017 (2017), pp.1-19, 19 p.
Journal Articles
Locality-Based Visual Outlier Detection Algorithm for Time Series
By: Li, Zhihua; Li, Ziyuan; Yu, Ning…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments
By: Khan, Muhammad Khurram; Kumari, Saru; Zeadally, Sherali…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
Journal Articles
Research on a New Signature Scheme on Blockchain
By: Yuan, Chao; Xu, Mi-xue; Du, Xiaojiang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems
By: Wang, Jingxuan; Hui, Lucas C. K.; Yiu, Siu-Ming…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
Quantum-to-the-Home: Achieving Gbitss Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment
By: Asif, Rameez; Martin, Vincente; Buchanan, William J.. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
Location Privacy Leakage through Sensory Data
By: Liang, Yi; Yang, Qing; Li, Yingshu…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model
By: Ouyang, Chunjuan; Leng, Ming; Liu, Huan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
Journal Articles
Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities
By: Wang, Licheng; Yang, Yixian; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings
By: Zhou, Caixue; Zhao, Zhiqiang; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
Journal Articles
Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks
By: Pradhan, Anita; Swain, Gandharba; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
Journal Articles
An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model
By: Zhou, Guomin; Yuan, Xiaohui; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-7, 7 p.
Journal Articles
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks
By: Li, Song; Cui, Jie; He, Qiang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
Journal Articles
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card
By: Wang, Chenyu; Xu, Guoai; Barenghi, Alessandro. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
Journal Articles
MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data
By: Xiangyang, Zhu; Dai, Hua; Yang, Geng…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
Journal Articles
Building Secure Public Key Encryption Scheme from Hidden Field Equations
By: Ping, Yuan; Wang, Baocang; Ye, Dengpan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-6, 6 p.
Journal Articles
NFC Secure Payment and Verification Scheme with CS E-Ticket
By: Zhu, Haojin; Li, Hui; Yang, Yintang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Cybersecurity Vulnerability Analysis of the PLC PRIME Standard
By: Seijo Simó, Miguel; López López, Gregorio; Zeadally, Sherali…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-18, 18 p.
Journal Articles
Automatic Reverse Engineering of Private Flight Control Protocols of UAVs
By: Ji, Ran; Tang, Chaojing; Li, Ruilin…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Quantitative Method for Network Security Situation Based on Attack Prediction
By: Hu, Hao; Zhang, Hongqi; Liu, Yuling…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-19, 19 p.
Journal Articles
Adaptive Security of Broadcast Encryption, Revisited
By: Zhu, Bingxin; Wei, Puwen; Wang, Mingqiang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
Journal Articles
Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage
By: Partala, Juha; Li, Huaizhi. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
Design and Analysis of Self-Healing Tree-Based Hybrid Spectral Amplitude Coding OCDMA System
By: Imtiaz, Waqas A.; Qamar, Affaq; Conti, Vincenzo…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
Privacy Preserved Self-Awareness on the Community via Crowd Sensing
By: Fan, Huiting; Xing, Kai; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
Journal Articles
CLAS: A Novel Communications Latency Based Authentication Scheme
By: Dou, Zuochao; Khalil, Issa; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-20, 20 p.
Journal Articles
Group Authentication with Multiple Trials and Multiple Authentications
By: Chien, Hung-Yu; Del Rey, Ángel Martín. Security and Communication Networks. No. 2017 (2017), pp.1-7, 7 p.
Journal Articles
SCPR: Secure Crowdsourcing-Based Parking Reservation System
By: Wan, Changsheng; Zhang, Juan; Huang, Daoli…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
«
1
2
3
4
»