- Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
- Reconfigurable content-based image retrieval on peer-to-peer networks
- Security analysis and improvement of a mutual authentication scheme under trusted computing
- A quantitative and knowledge-based approach to choosing security architectural tactics
- Anti-forensic steganography using multi-bit MER with flexible bit location
- A new handover authentication protocol based on bilinear pairing functions for wireless networks
- An improved biometric-based remote user authentication scheme for connected healthcare
- Principal component analysis-based data reduction model for wireless sensor networks
- Designing for privacy in ubiquitous social networking
6 March 2015
Special issue published: "Security Aspects in Pervasive and Ubiquitous Computing"
International Journal of Ad Hoc and Ubiquitous Computing 18(1/2) 2015
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment