skip to main content
Show Results with:

Results 1 - 10 of 878  for Everything in this catalogue

results 1 2 3 4 5 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Material Type:
Article
Add to My workspace

Anonymous authentication protocol for GSM networks

Asadpour, M.; Sattarzadeh, B.; Movaghar, A.

International journal of security and networks. VOL 3; NUMB 4, ; 2008, 54-62 -- INDERSCIENCE ENTERPRISES LTD (pages 54-62) -- 2008

Check library holdings

2
Material Type:
Article
Add to My workspace

Server-aided identity-based anonymous broadcast encryption

Cui, H.; Mu, Y.; Guo, F.

International journal of security and networks. VOL 8; NUMB 1, ; 2013, 29-39 -- INDERSCIENCE ENTERPRISES LTD Part 1; (pages 29-39) -- 2013

Check library holdings

3
Material Type:
Article
Add to My workspace

Reversing the effects of tokenisation attacks against content-based spam filters

Santos, I. et al.

International journal of security and networks. VOL 8; NUMB 2, ; 2013, 106-116 -- INDERSCIENCE ENTERPRISES LTD Part 2; (pages 106-116) -- 2013

Check library holdings

4
Material Type:
Article
Add to My workspace

Security analysis and improvement of two verifiable multi-secret sharing schemes

Yu, J.; Hao, R.; Cheng, X.

International journal of security and networks. VOL 8; NUMB 4, ; 2013, 200-206 -- INDERSCIENCE ENTERPRISES LTD Part 4; (pages 200-206) -- 2013

Check library holdings

5
Material Type:
Article
Add to My workspace

Implementation of battery inspection system for building energy management system

Kim, S.K. et al.

International journal of security and networks. VOL 9; NUMBER 4, ; 2014, 197-201 -- INDERSCIENCE ENTERPRISES LTD Part 4; (pages 197-201) -- 2014

Check library holdings

6
Material Type:
Article
Add to My workspace

Anomaly-based network IDS false alarm filter using cluster-based alarm classification approach

Qassim, Qais Saif; Zin, Abdullah Mohd; Aziz, Mohd Juzaiddin Ab

International journal of security and networks. Volume 12:Number 1 (2017); pp 13-26 -- Inderscience Enterprises Ltd

Online access

7
Material Type:
Article
Add to My workspace

Security analysis of LMAP using AVISPA

Islam, Salekul

International journal of security and networks. Volume 9:Number 1 (2014); pp 30-39 -- Inderscience Enterprises Ltd

Online access

8
Material Type:
Article
Add to My workspace

GeoGraphical passwords

Al–Salloum, Ziyad S.

International journal of security and networks. Volume 9:Number 1 (2014, January 1st); pp 56-62 -- Inderscience Enterprises Ltd

Online access

9
Material Type:
Article
Add to My workspace

Semi–supervised and compound classification of network traffic

Zhang, Jun et al.

International journal of security and networks. Volume 7:Number 4 (2012, January 1st); pp 252-261 -- Inderscience Enterprises Ltd

Online access

10
Material Type:
Article
Add to My workspace

User-aided data authentication

Laur, Sven; Pasini, Sylvain

International journal of security and networks. Volume 4:Number 1 (2009, January 1st); pp 69-86 -- Inderscience Enterprises Ltd

Online access

Results 1 - 10 of 878  for Everything in this catalogue

results 1 2 3 4 5 next page

Refine Search Results

Refine my results

Access Options 

  1. Request to Reading Room  (554)
  2. Purchase a copy  (554)
  3. Online: Reading Room only  (324)
  4. Refine further open sub menu

Material type 

  1. Articles  (877)
  2. Journals  (1)
  3. Refine further open sub menu

Subject 

  1. Computer networks--Security measures--Periodicals  (647)
  2. 3D watermarking--three  (4)
  3. mobile IMS--instant messaging service--IP multimedia subsystems--MIM--mobile instant messaging--resource management--resource allocation--wireless networks--IMS networks--resource optimisation--network planning--simulation  (4)
  4. system  (4)
  5. XACML--eXtensible Access Control Markup Language--GeoXACML--Geospatial eXtensible Access Control Markup Language--type--geospatial information--temporal information--spatio  (4)
  6. game layout--AI--artificial intelligence--mobile games--Tower Defence game--gaming--3D games--enemy pathfinder--priority targeting--gameplay strategy  (4)
  7. masquerade detection--Windows--GUI--graphical user interface--HMM--hidden Markov models--mouse movements--keystrokes--event logging--keyboard activity--masqueraders--masquerade attacks--security  (4)
  8. services--flexible networks--SONATE--service oriented network architecture--service oriented architecture--SOA--authentication--PKI--public key infrastructure--network security--authentication  (4)
  9. authorisation certificates--certificate chains--chain reduction--performance improvement--privacy protection--privacy preservation--SPKI--public key infrastructure--IoT--internet of things--embedded systems--access control--network security  (3)
  10. ad hoc networks--security--identity-based cryptography--key escrow--communication security--mobile networks--MANETs--key management--spy nodes--key generation centres--node monitoring  (2)
  11. wireless sensor networks--WSNs--public key crytography--elliptic curve crytography--ECC--access control--wireless networks--security  (2)
  12. access control--applied cryptography--compact private key--data con?dentiality--exclusion-intersection encryption--IBE--identity-based encryption--online encryption--offline encryption--pairings--security  (2)
  13. wireless sensor networks--WSNs--security--key pre-distribution--node disjoint paths--wireless networks--pairwise key establishment  (2)
  14. proximity-based authentication--security--secure pairing--radio authentication--mobile devices--co-located devices--passive attacks--active attacks  (2)
  15. RFID security--radio-frequency identification--implementation attacks--power analysis--electromagnetic analysis--side-channel analysis--fault analysis--passive RFID tags  (2)
  16. access control--group communication--key management--multimedia networks--distributed control--security  (2)
  17. computer worms--defensive worms--beneficial worms--network security--network protection--enterprise networks--malicious worms--malware  (2)
  18. secure collaboration--message boards--security--key predistribution--trust modules--networks--collaborative systems--cryptography--service attacks  (2)
  19. end-to-end security--identity-based cryptography--ID-based cryptography--public key--mobile communications--encryption--short message service--SMS security--networks--Rivest-Shamir-Adleman--mobile services  (2)
  20. layered multicast--streaming--security--transition key management--application level multicast--ALM--group communication--cryptography--traffic encryption key--intruder attacks  (2)
  21. Refine further open sub menu

Creation date 

From To
  1. Before2008  (144)
  2. 2008To2009  (162)
  3. 2010To2011  (138)
  4. 2012To2014  (201)
  5. After 2014  (233)
  6. Refine further open sub menu

Form/Genre 

  1. Article  (877)
  2. Periodicals  (1)
  3. Refine further open sub menu

Additional Features 

  1. Abstract  (661)
  2. No Abstract  (216)
  3. Refine further open sub menu

Searching Remote Databases, Please Wait