e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(872)
Data Type
Journal Articles
(872)
Language
English
(872)
Country
Egypt
(872)
Authors / Persons
Xu, Xiaolong
(25)
Del Rey, Ángel Martín
(22)
Nicopolitidis, Petros
(22)
Maiorana, Emanuele
(21)
Galdi, Clemente
(18)
Megias, David
(17)
Maglaras, Leandros A.
(16)
Pan, Zhaoqing
(16)
Alazab, Mamoun
(15)
Díaz-Verdejo, Jesús
(15)
Gope, Prosanta
(15)
Qi, Lianyong
(15)
You, Ilsun
(15)
Conti, Vincenzo
(14)
Choo, Kim-Kwang Raymond
(13)
Genge, Bela
(13)
Li, Huaizhi
(13)
Yang, Qing
(13)
Cimato, Stelvio
(12)
Hu, Jiankun
(12)
Yan, Zheng
(12)
Anees, Amir
(11)
Li, Fagen
(11)
Cai, Z.
(10)
Di Pietro, Roberto
(10)
Khan, Muhammad Khurram
(10)
Zhang, Xuyun
(10)
Antonopoulos, Angelos
(9)
Caballero-Gil, Pino
(9)
Gao, Honghao
(9)
Xia, Zhihua
(9)
Liang, Kaitai
(8)
Yeh, Kuo-Hui
(8)
Zeadally, Sherali
(8)
Angin, Pelin
(7)
Chang, Chin-Chen
(7)
He, Debiao
(7)
Meng, Weizhi
(7)
Nazir, Shah
(7)
Qian, Zhenxing
(7)
Wang, Baocang
(7)
Wang, Jian
(7)
Del Rey, Angel M.
(6)
Du, Xiaojiang
(6)
D’Antonio, Salvatore
(6)
Kapron, Bruce M.
(6)
Liu, Zhe
(6)
Liu, Zhe-Li
(6)
Luo, Xiangyang
(6)
Wang, Wei
(6)
Yang, Geng
(6)
Huang, Cheng
(5)
Kim, Hyoungshick
(5)
Li, Hui
(5)
Li, Li
(5)
Li, Tao
(5)
Ma, Liran
(5)
Maglaras, Leandros
(5)
Masucci, Barbara
(5)
Mazurczyk, Wojciech
(5)
Palomar, Esther
(5)
Sciancalepore, Savio
(5)
Xu, Guoai
(5)
Yang, Yixian
(5)
Yuan, Yuan
(5)
Zhang, Hongqi
(5)
Zhang, Jie
(5)
Zhang, Xiaosong
(5)
Zhang, Yuchen
(5)
Zheng, Kangfeng
(5)
Zhuang, Yi
(5)
Alcaraz, Cristina
(4)
Cai, Zhipeng
(4)
Chen, Hefeng
(4)
Chen, Kefei
(4)
Chen, Thomas M.
(4)
Chen, Xingshu
(4)
Cogranne, Rémi
(4)
Dai, Hua
(4)
Geneiatakis, Dimitrios
(4)
Giri, Debasis
(4)
Harn, Lein
(4)
Jeong, Ik Rae
(4)
Jiang, Qi
(4)
Jung, Ki-Hyun
(4)
Kim, Kiseon
(4)
Li, Bin
(4)
Li, Tong
(4)
Li, Wenjia
(4)
Liu, Jiayong
(4)
Liu, Xiaolei
(4)
Lorenz, Pascal
(4)
Mahalik, Prem
(4)
Milutinovic, Veljko
(4)
Mostarda, Leonardo
(4)
Peinado, A.
(4)
Ping, Yuan
(4)
Qin, Jing
(4)
Ren, Jiadong
(4)
Shen, Jian
(4)
Show more
Update
Source
Security and Communication Networks
(872)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(872)
Range:
Search Results
(
801
-
850
of
872
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks
By: Pradhan, Anita; Swain, Gandharba; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
Journal Articles
An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model
By: Zhou, Guomin; Yuan, Xiaohui; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-7, 7 p.
Journal Articles
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks
By: Li, Song; Cui, Jie; He, Qiang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
Journal Articles
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card
By: Wang, Chenyu; Xu, Guoai; Barenghi, Alessandro. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
Journal Articles
MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data
By: Xiangyang, Zhu; Dai, Hua; Yang, Geng…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
Journal Articles
Building Secure Public Key Encryption Scheme from Hidden Field Equations
By: Ping, Yuan; Wang, Baocang; Ye, Dengpan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-6, 6 p.
Journal Articles
NFC Secure Payment and Verification Scheme with CS E-Ticket
By: Zhu, Haojin; Li, Hui; Yang, Yintang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Cybersecurity Vulnerability Analysis of the PLC PRIME Standard
By: Seijo Simó, Miguel; López López, Gregorio; Zeadally, Sherali…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-18, 18 p.
Journal Articles
Automatic Reverse Engineering of Private Flight Control Protocols of UAVs
By: Ji, Ran; Tang, Chaojing; Li, Ruilin…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Quantitative Method for Network Security Situation Based on Attack Prediction
By: Hu, Hao; Zhang, Hongqi; Liu, Yuling…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-19, 19 p.
Journal Articles
Adaptive Security of Broadcast Encryption, Revisited
By: Zhu, Bingxin; Wei, Puwen; Wang, Mingqiang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
Journal Articles
Semantically Secure Symmetric Encryption with Error Correction for Distributed Storage
By: Partala, Juha; Li, Huaizhi. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
Design and Analysis of Self-Healing Tree-Based Hybrid Spectral Amplitude Coding OCDMA System
By: Imtiaz, Waqas A.; Qamar, Affaq; Conti, Vincenzo…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
Privacy Preserved Self-Awareness on the Community via Crowd Sensing
By: Fan, Huiting; Xing, Kai; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
Journal Articles
CLAS: A Novel Communications Latency Based Authentication Scheme
By: Dou, Zuochao; Khalil, Issa; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-20, 20 p.
Journal Articles
Group Authentication with Multiple Trials and Multiple Authentications
By: Chien, Hung-Yu; Del Rey, Ángel Martín. Security and Communication Networks. No. 2017 (2017), pp.1-7, 7 p.
Journal Articles
SCPR: Secure Crowdsourcing-Based Parking Reservation System
By: Wan, Changsheng; Zhang, Juan; Huang, Daoli…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices
By: Quax, Peter; Lamotte, Wim; Lorenz, Pascal…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-21, 21 p.
Journal Articles
Efficient Solutions to Two-Party and Multiparty Millionaires’ Problem
By: Liu, Xin; Li, Shundong; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
Journal Articles
Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners
By: Alsaleh, Mansour; Alomar, Noura; Al-Salman, Abdulmalik S.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
Journal Articles
PMCAP: A Threat Model of Process Memory Data on the Windows Operating System
By: Pan, Jiaye; Zhuang, Yi; Du, Xiaojiang. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
Journal Articles
A Survey on Secure Wireless Body Area Networks
By: Zou, Shihong; Chen, Shanzhi; Lu, Rongxing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection
By: Zheng, Kangfeng; Niu, Xinxin; Peris-Lopez, P.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
Journal Articles
An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service
By: Gui, Xiaolin; An, Jian; Tian, Feng…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
Journal Articles
Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems
By: Zhao, Ju-min; Li, Deng-ao; Rannenberg, Kai…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
An Efficient Context-Aware Privacy Preserving Approach for Smartphones
By: Zhang, Lichen; Li, Yingshu; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
Journal Articles
RFA: R-Squared Fitting Analysis Model for Power Attack
By: Wang, An; Zhu, Liehuang; Du, Xiaojiang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
Journal Articles
Identification of ICS Security Risks toward the Analysis of Packet Interaction Characteristics Using State Sequence Matching Based on SF-FSM
By: Xu, Jianxin; Feng, Dongqin; Alazab, Mamoun. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
Journal Articles
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing
By: Hussain, Mohammed Abdulridha; Jin, Hai; Lorenz, Pascal…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
Journal Articles
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications
By: Shehada, Dina; al-Qutayri, Mahmoud A.; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-18, 18 p.
Journal Articles
Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection
By: Kim, Sang-Pil; Gil, Myeong-Sun; Choi, Mi-Jung…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks
By: Liu, Lan; Ko, Ryan K. L.; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
Journal Articles
New Hybrid Features Selection Method: A Case Study on Websites Phishing
By: Rajab, Khairan D.; Khan, Muhammad Khurram. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party
By: Hua, Jingyu; Tang, An; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
A Secured Load Mitigation and Distribution Scheme for Securing SIP Server
By: Ganesan, Vennila; Masucci, Barbara; MSK, Manikandan. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
Journal Articles
Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud
By: Gan, Qingqing; Wang, Xiaoming; Wu, Daini…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
Journal Articles
Differential Privacy for Edge Weights in Social Networks
By: Li, Xiaoye; Yang, Jing; Zhang, Jianpei…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks
By: Li, Peng; Xu, He; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
A Privacy Model for RFID Tag Ownership Transfer
By: Yang, Xingchun; Xu, Chun-xiang; Khan, Muhammad Khurram…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo
By: Han, Guoyong; Zhang, Wenying; Nasser, Nidal. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information
By: Soria-Lorente, A.; Berres, S.; Masucci, Barbara. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
Journal Articles
An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents
By: Tsai, Chien-Hua; Antonopoulos, Angelos; Su, Pin-Chang. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
Journal Articles
An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks
By: Zhao, Zheng; Liu, Fenlin; Di Pietro, Roberto…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
Optimization of a Blind Speech Watermarking Technique against Amplitude Scaling
By: Nematollahi, Mohammad Ali; Vorakulpipat, Chalee; Gamboa-Rosales, Hamurabi…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
Journal Articles
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications
By: Dalai, Asish Kumar; Choo, Kim-Kwang Raymond; Jena, Sanjay Kumar. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
The Performance Evaluation of an IEEE 802.11 Network Containing Misbehavior Nodes under Different Backoff Algorithms
By: Hoang, Trong-Minh; Bui, Van-Kien; Gringoli, Francesco…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
Journal Articles
Protecting Information with Subcodstanography
By: Köhler, Mirko; Lukić, Ivica; Križanović Čik, Višnja…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
Journal Articles
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker
By: Wazan, Ahmad Samer; Laborde, Romain; Masucci, Barbara…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-23, 23 p.
Journal Articles
Certificateless Public Auditing Protocol with Constant Verification Time
By: Kim, Dongmin; Jeong, Ik Rae; Khan, Muhammad Khurram. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
Journal Articles
Dynamic Rule Encryption for Mobile Payment
By: Husni, Emir; Del Rey, Ángel Martín. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
«
9
10
11
12
13
14
15
16
17
18
»