Journal articles on the topic 'Firewalls (Computer security) Computer networks Cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Firewalls (Computer security) Computer networks Cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Prakash N Kalavadekar, Mr, and Dr Shirish S. Sane. "Effect of Mutation and Crossover Probabilities on Genetic Algorithm and Signature Based Intrusion Detection System." International Journal of Engineering & Technology 7, no. 4.19 (November 27, 2018): 1011. http://dx.doi.org/10.14419/ijet.v7i4.19.28277.
Full textAnas Aljarah, Ghaith Alomari,. "Efficiency of Using the Diffie-Hellman Key in Cryptography for Internet Security." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2039–44. http://dx.doi.org/10.17762/turcomat.v12i6.4807.
Full textCheng, Haosu, Jianwei Liu, Jian Mao, Mengmeng Wang, Jie Chen, and Jingdong Bian. "A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN." Security and Communication Networks 2018 (November 15, 2018): 1–20. http://dx.doi.org/10.1155/2018/8392080.
Full textMenkus, Belden. "Firewalls in Information Systems Security." EDPACS 23, no. 3 (September 1995): 9–15. http://dx.doi.org/10.1080/07366989509451685.
Full textCastro, Julio César Hernández, and Pedro Isasi Viñuela. "Evolutionary Computation in computer security and cryptography." New Generation Computing 23, no. 3 (September 2005): 193–99. http://dx.doi.org/10.1007/bf03037654.
Full textNiemiec, M., and A. R. Pach. "Management of security in quantum cryptography." IEEE Communications Magazine 51, no. 8 (August 2013): 36–41. http://dx.doi.org/10.1109/mcom.2013.6576336.
Full textRahneva, Darina, Vanya Stoykova, Angelina Cherneva, and Krum Videnov. "VIRTUAL LABORATORY for NETWORK AND COMPUTER SECURITY." International Conference on Technics, Technologies and Education, no. 1 (2018): 315–22. http://dx.doi.org/10.15547/ictte.2018.08.003.
Full textHussain, Iqtadar, Fawad Ahmed, Umar M. Khokhar, and Amir Anees. "Applied Cryptography and Noise Resistant Data Security." Security and Communication Networks 2018 (December 2, 2018): 1–2. http://dx.doi.org/10.1155/2018/3962821.
Full textZaz, Youssef, Lhoussain El Fadil, and Mohamed El Kayyali. "Securing EPR Data Using Cryptography and Image Watermarking." International Journal of Mobile Computing and Multimedia Communications 4, no. 2 (April 2012): 76–87. http://dx.doi.org/10.4018/jmcmc.2012040106.
Full textSingh, Dilbag. "Establishing security of Bitcoins using elliptic-curve cryptography-based protocol." International Journal of Internet Technology and Secured Transactions 11, no. 3 (2021): 1. http://dx.doi.org/10.1504/ijitst.2021.10036589.
Full textSingh, Dilbag. "Establishing security of Bitcoins using elliptic-curve cryptography-based protocol." International Journal of Internet Technology and Secured Transactions 11, no. 3 (2021): 209. http://dx.doi.org/10.1504/ijitst.2021.114927.
Full textGao, Tianhan, Nan Guo, and Kangbin Yim. "A hybrid approach to secure hierarchical mobile IPv6 networks." Computer Science and Information Systems 10, no. 2 (2013): 913–38. http://dx.doi.org/10.2298/csis121114041g.
Full textYassine, Maleh, and Abdellah Ezzati. "LEAP Enhanced." International Journal of Mobile Computing and Multimedia Communications 7, no. 3 (July 2016): 42–66. http://dx.doi.org/10.4018/ijmcmc.2016070104.
Full textKabbur, Mahabaleshwar, Anand R, and Arul Kumar V. "MAR Security: Improved Security Mechanism for Emergency Messages of VANET using Group Key Management & Cryptography Schemes (GKMC)." International journal of Computer Networks & Communications 13, no. 04 (July 31, 2021): 101–21. http://dx.doi.org/10.5121/ijcnc.2021.13407.
Full textChamola, Vinay, Alireza Jolfaei, Vaibhav Chanana, Prakhar Parashari, and Vikas Hassija. "Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography." Computer Communications 176 (August 2021): 99–118. http://dx.doi.org/10.1016/j.comcom.2021.05.019.
Full textNajm, Hayder, Haider K. Hoomod, and Rehab Hassan. "A New WoT Cryptography Algorithm Based on GOST and Novel 5d Chaotic System." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 02 (January 26, 2021): 184. http://dx.doi.org/10.3991/ijim.v15i02.19961.
Full textLim, Hoon Wei, and Kenneth G. Paterson. "Identity-based cryptography for grid security." International Journal of Information Security 10, no. 1 (September 10, 2010): 15–32. http://dx.doi.org/10.1007/s10207-010-0116-z.
Full textYamamoto, Dan, and Wakaha Ogata. "Multidivisible Online/Offline Cryptography and Its Application to Signcryptions." Security and Communication Networks 2019 (October 8, 2019): 1–21. http://dx.doi.org/10.1155/2019/1042649.
Full textBodei, Chiara, Lorenzo Ceragioli, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Flaminia Luccio, Mauro Tempesta, and Lorenzo Veronese. "FWS: Analyzing, maintaining and transcompiling firewalls." Journal of Computer Security 29, no. 1 (February 3, 2021): 77–134. http://dx.doi.org/10.3233/jcs-200017.
Full textBuduri, Reddaiah, SrinivasaRao Kanusu, Swetha Chinthakunta, Amruthavani Godina, and Sivajyothi Siddavatam. "Linear Congruential Pseudorandom Numbered Hybrid Crypto-System with Genetic Algorithms." International Journal of Engineering and Advanced Technology 10, no. 2 (December 30, 2020): 159–63. http://dx.doi.org/10.35940/ijeat.b2092.1210220.
Full textSchoinianakis, Dimitrios. "Residue arithmetic systems in cryptography: a survey on modern security applications." Journal of Cryptographic Engineering 10, no. 3 (June 25, 2020): 249–67. http://dx.doi.org/10.1007/s13389-020-00231-w.
Full textSrivastava, Gaurav, Richa Agrawal, Kunwar Singh, Rajeev Tripathi, and Kshirasagar Naik. "A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography." Peer-to-Peer Networking and Applications 13, no. 1 (August 14, 2019): 348–67. http://dx.doi.org/10.1007/s12083-019-00776-6.
Full textZhou, Tianqi, Jian Shen, Xiong Li, Chen Wang, and Jun Shen. "Quantum Cryptography for the Future Internet and the Security Analysis." Security and Communication Networks 2018 (2018): 1–7. http://dx.doi.org/10.1155/2018/8214619.
Full textZHOU, JIANTAO, QINZHEN XU, WENJIANG PEI, ZHENYA HE, and HAROLD SZU. "STEP TO IMPROVE NEURAL CRYPTOGRAPHY AGAINST FLIPPING ATTACKS." International Journal of Neural Systems 14, no. 06 (December 2004): 393–405. http://dx.doi.org/10.1142/s0129065704002145.
Full textMing, Yang, and Hongliang Cheng. "Efficient Certificateless Conditional Privacy-Preserving Authentication Scheme in VANETs." Mobile Information Systems 2019 (February 3, 2019): 1–19. http://dx.doi.org/10.1155/2019/7593138.
Full textCarman, David W. "New Directions in Sensor Network Key Management." International Journal of Distributed Sensor Networks 1, no. 1 (February 2005): 3–15. http://dx.doi.org/10.1080/15501320490522803.
Full textBeunardeau, Marc, Aisling Connolly, Remi Geraud, and David Naccache. "White-Box Cryptography: Security in an Insecure Environment." IEEE Security & Privacy 14, no. 5 (September 2016): 88–92. http://dx.doi.org/10.1109/msp.2016.100.
Full textÁlvarez-Díaz, Néstor, Pino Caballero-Gil, and Mike Burmester. "A Luggage Control System Based on NFC and Homomorphic Cryptography." Mobile Information Systems 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/2095161.
Full textZhang, Ke, Kai Xu, and Fushan Wei. "A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2018 (July 16, 2018): 1–9. http://dx.doi.org/10.1155/2018/2484268.
Full textLiu, Jingang, Yongge Wang, Zongxiang Yi, and Zhiqiang Lin. "polarRLCE: A New Code-Based Cryptosystem Using Polar Codes." Security and Communication Networks 2019 (December 26, 2019): 1–10. http://dx.doi.org/10.1155/2019/3086975.
Full textGurunathan, K., and S. P. Rajagopalan. "A stegano - visual cryptography technique for multimedia security." Multimedia Tools and Applications 79, no. 5-6 (March 22, 2019): 3893–911. http://dx.doi.org/10.1007/s11042-019-7471-1.
Full textAntonio, Harianto, P. W. C. Prasad, and Abeer Alsadoon. "Implementation of cryptography in steganography for enhanced security." Multimedia Tools and Applications 78, no. 23 (May 10, 2019): 32721–34. http://dx.doi.org/10.1007/s11042-019-7559-7.
Full textJeong, Sooyong, Cheolhee Park, Dowon Hong, Changho Seo, and Namsu Jho. "Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems." Security and Communication Networks 2021 (February 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/6680782.
Full textArockiasamy, John Prakash, Lydia Elizabeth Benjamin, and Rhymend Uthariaraj Vaidyanathan. "Beyond Statistical Analysis in Chaos-Based CSPRNG Design." Security and Communication Networks 2021 (June 10, 2021): 1–14. http://dx.doi.org/10.1155/2021/5597720.
Full textSalah, Mohammed Saïd, Maizate Abderrahim, Ouzzif Mohamed, and Toumi Mohamed. "Mobile nodes for improving security and lifetime efficiency in wireless sensor networks." International Journal of Pervasive Computing and Communications 15, no. 1 (April 1, 2019): 2–15. http://dx.doi.org/10.1108/ijpcc-06-2019-057.
Full textTiberti, Walter, Federica Caruso, Luigi Pomante, Marco Pugliese, Marco Santic, and Fortunato Santucci. "Development of an extended topology-based lightweight cryptographic scheme for IEEE 802.15.4 wireless sensor networks." International Journal of Distributed Sensor Networks 16, no. 10 (October 2020): 155014772095167. http://dx.doi.org/10.1177/1550147720951673.
Full textAL-HANANI, ALI, and VENUS W. SAMAWI. "virus Detection Using Cryptography Algorithm." Iraqi Journal for Computers and Informatics 27, no. 1 (June 30, 1996): 8–15. http://dx.doi.org/10.25195/ijci.v27i1.220.
Full textDemay, Grégory, Peter Gaži, Ueli Maurer, and Björn Tackmann. "Per-session security: Password-based cryptography revisited." Journal of Computer Security 27, no. 1 (January 11, 2019): 75–111. http://dx.doi.org/10.3233/jcs-181131.
Full textAyachi, Riadh, Ayoub Mhaouch, and Abdessalem Ben Abdelali. "Lightweight Cryptography for Network-on-Chip Data Encryption." Security and Communication Networks 2021 (May 19, 2021): 1–10. http://dx.doi.org/10.1155/2021/9943713.
Full textDayo Alowolodu, Olufunso, Gabriel K Adelaja, Boniface K Alese, and Olufunke Catherine Olayemi. "Medical Image Security Using Quantum Cryptography." Issues in Informing Science and Information Technology 15 (2018): 057–67. http://dx.doi.org/10.28945/4008.
Full textZhang, Futai, Sujuan Li, Songqin Miao, Yi Mu, Willy Susilo, and Xinyi Huang. "Cryptanalysis on Two Certificateless Signature Schemes." International Journal of Computers Communications & Control 5, no. 4 (November 1, 2010): 586. http://dx.doi.org/10.15837/ijccc.2010.4.2517.
Full textMing, Xiaobo, Ying Chen, and Jinhua Guo. "Analysis of Computer Network Information Security and Protection Strategy." MATEC Web of Conferences 267 (2019): 02013. http://dx.doi.org/10.1051/matecconf/201926702013.
Full textRajan, D. Antony Joseph, and E. R. Naganathan. "Long and Strong Security using Reputation and ECC for Cloud Assisted Wireless Sensor Networks." Scalable Computing: Practice and Experience 21, no. 1 (March 19, 2020): 85–92. http://dx.doi.org/10.12694/scpe.v21i1.1624.
Full textFilippov, M. V., N. Yu Ryazanova, and B. I. Ryazantsev. "The Outgoing and Incoming Network Packets Intercepting Method." Mechanical Engineering and Computer Science, no. 12 (January 4, 2018): 45–56. http://dx.doi.org/10.24108/1217.0001344.
Full textFan, Jinliang, Jun Xu, Mostafa H. Ammar, and Sue B. Moon. "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme." Computer Networks 46, no. 2 (October 2004): 253–72. http://dx.doi.org/10.1016/j.comnet.2004.03.033.
Full textXia, Zhe, Yining Liu, Ching-Fang Hsu, and Chin-Chen Chang. "Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications." Security and Communication Networks 2020 (July 13, 2020): 1–8. http://dx.doi.org/10.1155/2020/6183861.
Full textMahfouz, Ahmed, Abdullah Abuhussein, Deepak Venugopal, and Sajjan Shiva. "Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset." Future Internet 12, no. 11 (October 26, 2020): 180. http://dx.doi.org/10.3390/fi12110180.
Full textBaashirah, Rania, Abdelshakour Abuzneid, Salah Addine Mellouki, Zeba Siraj, and Cheng Zhan. "Low-Cost RFID Authentication Protocol Based on Elliptic Curve Algorithm." International Journal of Interdisciplinary Telecommunications and Networking 13, no. 2 (April 2021): 1–11. http://dx.doi.org/10.4018/ijitn.2021040101.
Full textFu, Yulong, Zheng Yan, Jin Cao, Ousmane Koné, and Xuefei Cao. "An Automata Based Intrusion Detection Method for Internet of Things." Mobile Information Systems 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1750637.
Full textZain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.
Full text