e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(872)
Data Type
Journal Articles
(872)
Language
English
(872)
Country
Egypt
(872)
Authors / Persons
Xu, Xiaolong
(25)
Del Rey, Ángel Martín
(22)
Nicopolitidis, Petros
(22)
Maiorana, Emanuele
(21)
Galdi, Clemente
(18)
Megias, David
(17)
Maglaras, Leandros A.
(16)
Pan, Zhaoqing
(16)
Alazab, Mamoun
(15)
Díaz-Verdejo, Jesús
(15)
Gope, Prosanta
(15)
Qi, Lianyong
(15)
You, Ilsun
(15)
Conti, Vincenzo
(14)
Choo, Kim-Kwang Raymond
(13)
Genge, Bela
(13)
Li, Huaizhi
(13)
Yang, Qing
(13)
Cimato, Stelvio
(12)
Hu, Jiankun
(12)
Yan, Zheng
(12)
Anees, Amir
(11)
Li, Fagen
(11)
Cai, Z.
(10)
Di Pietro, Roberto
(10)
Khan, Muhammad Khurram
(10)
Zhang, Xuyun
(10)
Antonopoulos, Angelos
(9)
Caballero-Gil, Pino
(9)
Gao, Honghao
(9)
Xia, Zhihua
(9)
Liang, Kaitai
(8)
Yeh, Kuo-Hui
(8)
Zeadally, Sherali
(8)
Angin, Pelin
(7)
Chang, Chin-Chen
(7)
He, Debiao
(7)
Meng, Weizhi
(7)
Nazir, Shah
(7)
Qian, Zhenxing
(7)
Wang, Baocang
(7)
Wang, Jian
(7)
Del Rey, Angel M.
(6)
Du, Xiaojiang
(6)
D’Antonio, Salvatore
(6)
Kapron, Bruce M.
(6)
Liu, Zhe
(6)
Liu, Zhe-Li
(6)
Luo, Xiangyang
(6)
Wang, Wei
(6)
Yang, Geng
(6)
Huang, Cheng
(5)
Kim, Hyoungshick
(5)
Li, Hui
(5)
Li, Li
(5)
Li, Tao
(5)
Ma, Liran
(5)
Maglaras, Leandros
(5)
Masucci, Barbara
(5)
Mazurczyk, Wojciech
(5)
Palomar, Esther
(5)
Sciancalepore, Savio
(5)
Xu, Guoai
(5)
Yang, Yixian
(5)
Yuan, Yuan
(5)
Zhang, Hongqi
(5)
Zhang, Jie
(5)
Zhang, Xiaosong
(5)
Zhang, Yuchen
(5)
Zheng, Kangfeng
(5)
Zhuang, Yi
(5)
Alcaraz, Cristina
(4)
Cai, Zhipeng
(4)
Chen, Hefeng
(4)
Chen, Kefei
(4)
Chen, Thomas M.
(4)
Chen, Xingshu
(4)
Cogranne, Rémi
(4)
Dai, Hua
(4)
Geneiatakis, Dimitrios
(4)
Giri, Debasis
(4)
Harn, Lein
(4)
Jeong, Ik Rae
(4)
Jiang, Qi
(4)
Jung, Ki-Hyun
(4)
Kim, Kiseon
(4)
Li, Bin
(4)
Li, Tong
(4)
Li, Wenjia
(4)
Liu, Jiayong
(4)
Liu, Xiaolei
(4)
Lorenz, Pascal
(4)
Mahalik, Prem
(4)
Milutinovic, Veljko
(4)
Mostarda, Leonardo
(4)
Peinado, A.
(4)
Ping, Yuan
(4)
Qin, Jing
(4)
Ren, Jiadong
(4)
Shen, Jian
(4)
Show more
Update
Source
Security and Communication Networks
(872)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(872)
Range:
Search Results
(
851
-
872
of
872
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
Security Analysis of a Certificateless Signature from Lattices
By: Chang, Seunghwan; Lee, Hyang-Sook; Caballero-Gil, Pino…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-7, 7 p.
Journal Articles
Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications
By: Hu, Xiaoming; Tan, Wenan; Khan, Muhammad Khurram…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6
By: Lu, Y.; Wang, Meng; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Two-Phase Image Encryption Scheme Based on FFCT and Fractals
By: Mikhail, Mervat; Abouelseoud, Yasmine; ElKobrosy, Galal…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
Journal Articles
Hierarchical Group Based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and Future 5G Networks
By: Roychoudhury, Probidita; Roychoudhury, Basav; Khan, Muhammad Khurram…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-21, 21 p.
Journal Articles
GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN
By: Gunasekaran, Mahalakshmi; Yang, Qing; Periakaruppan, Subathra. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
Practical Implementation of an Adaptive Detection-Defense Unit against Link Layer DoS Attacks for Wireless Sensor Networks
By: Dener, Murat; Khan, Muhammad Khurram; Bay, Omer Faruk. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
A Chaos-Based Authenticated Cipher with Associated Data
By: Teh, Je Sen; Caballero-Gil, P.; Samsudin, Azman. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
Journal Articles
Novel Noncommutative Cryptography Scheme Using Extra Special Group
By: Kumar, Gautam; Caballero-Gil, P.; Saini, Hemraj. Security and Communication Networks. No. 2017 (2017), pp.1-21, 21 p.
Journal Articles
Visible Watermarking Technique Based on Human Visual System for Single Sensor Digital Cameras
By: Santoyo-Garcia, Hector; Nakano-Miyatake, Mariko; Cilardo, Alessandro…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-18, 18 p.
Journal Articles
A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images
By: Chandrasekaran, Jeyamala; Thiruvengadam, S. J.; Del Rey, Ángel Martín. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives
By: Vorakulpipat, Chalee; Sirapaisan, Soontorn; Rattanalerdnusorn, Ekkachan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
Journal Articles
A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System
By: Parmar, Nishaal J.; Verma, Pramode K.; Martin, Vincente. Security and Communication Networks. No. 2017 (2017), pp.1-7, 7 p.
Journal Articles
A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models
By: Tsai, Yuan-Yu; Cheng, Tsung-Chieh; Huang, Yao-Hsien…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
Journal Articles
Revocable ID-Based Signature with Short Size over Lattices
By: Hung, Ying-Hao; Khan, Muhammad Khurram; Huang, Sen-Shan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
A Fusion of Multiagent Functionalities for Effective Intrusion Detection System
By: Krishnan Sadhasivan, Dhanalakshmi; Yan, Zheng; Balasubramanian, Kannapiran. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
Journal Articles
A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding
By: Azam, Naveed Ahmed; Lorenz, Pascal. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Cloud Service Scheduling Algorithm Research and Optimization
By: Cui, Hongyan; Liu, Xiaofei; Lee, Jong-Hyouk…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-7, 7 p.
Journal Articles
Phishing Detection: Analysis of Visual Similarity Based Approaches
By: Jain, Ankit Kumar; Khan, Muhammad Khurram; Gupta, B. B.. Security and Communication Networks. No. 2017 (2017), pp.1-20, 20 p.
Journal Articles
Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters
By: Man, Dapeng; Choo, Kim-Kwang Raymond; Du, Xiaojiang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length
By: Li, J.; Huang, X.; Shen, Jian…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
Journal Articles
Improved Instance Selection Methods for Support Vector Machine Speed Optimization
By: Akinyelu, Andronicus A.; Adewumi, Aderemi Oluyinka; Lorenz, Pascal. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
«
9
10
11
12
13
14
15
16
17
18
»