Analytical study of hardware-rooted security standards and their implementation techniques in mobile | 0 | 0.34 | 2020 |
Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems. | 3 | 0.39 | 2016 |
Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment. | 3 | 0.37 | 2016 |
EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network. | 9 | 0.52 | 2015 |
Load Balanced Routing For Lifetime Maximization In Mobile Wireless Sensor Networks | 0 | 0.34 | 2014 |
Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication. | 1 | 0.36 | 2010 |
Efficient Approximation of Higher Order Boolean function in a Low Order Function. | 0 | 0.34 | 2009 |
Modifications in the Design of Trivium to Increase its Security Level. | 1 | 0.36 | 2009 |
Security Analysis of Ultra-lightweight Cryptographic Protocol for Low-cost RFID Tags: Gossamer Protocol | 17 | 0.74 | 2009 |
An Efficient Collusion Resistant Security Mechanism For Heterogeneous Sensor Networks | 0 | 0.34 | 2009 |
Algebraic analysis of Trivium and Trivium/128 | 0 | 0.34 | 2008 |
Key Management and Secure Routing in Heterogeneous Sensor Networks | 4 | 0.53 | 2008 |
Scalable and efficient key management for heterogeneous sensor networks | 21 | 0.89 | 2008 |
A key distribution scheme preventing collusion attacks in ubiquitous heterogeneous sensor networks | 2 | 0.41 | 2007 |
A Key Management Scheme Based on Random Key Distribution for Clustered Wireless Sensor Networks | 0 | 0.34 | 2007 |
An efficient key distribution scheme for heterogeneous sensor networks | 21 | 0.93 | 2007 |
A Review of Cryptanalytic Attacks on E-STREAM Submitted Stream Ciphers | 0 | 0.34 | 2007 |
Attack-resilient random key distribution scheme for distributed sensor networks | 0 | 0.34 | 2007 |
An Analysis of Public Key Cryptography based Techniques in Wireless Sensor Networks | 0 | 0.34 | 2007 |
Secure group communication with self-healing and rekeying in wireless sensor networks | 23 | 0.89 | 2007 |
Algebraic Attack on A5-type Irregularly Clocked Key Stream Generator | 1 | 0.41 | 2007 |
Arcanum: A Secure and Efficient Key Exchange Protocol for the Internet | 3 | 0.41 | 2004 |