Journal articles on the topic 'Secure Networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secure Networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Elaine Shi and A. Perrig. "Designing Secure Sensor Networks." IEEE Wireless Communications 11, no. 6 (2004): 38–43. http://dx.doi.org/10.1109/mwc.2004.1368895.
Full textZhan, Justin. "Secure Collaborative Social Networks." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40, no. 6 (2010): 682–89. http://dx.doi.org/10.1109/tsmcc.2010.2050879.
Full textBreeding, Marshall. "Designing secure library networks." Library Hi Tech 15, no. 1/2 (1997): 11–20. http://dx.doi.org/10.1108/07378839710306945.
Full textKotzanikolaou, Panayiotis, Roza Mavropodi, Christos Douligeris, and Vassilios Chrissikopoulos. "Secure distributed intelligent networks." Computer Communications 29, no. 3 (2006): 325–36. http://dx.doi.org/10.1016/j.comcom.2004.12.012.
Full textMaivizhi, Radhakrishnan, and Palanichamy Yogesh. "Secure In-Network Aggregation in Wireless Sensor Networks." International Journal of Intelligent Information Technologies 16, no. 1 (2020): 49–74. http://dx.doi.org/10.4018/ijiit.2020010104.
Full textShang, Tao, Jiao Li, and Jian-wei Liu. "Secure quantum network coding for controlled repeater networks." Quantum Information Processing 15, no. 7 (2016): 2937–53. http://dx.doi.org/10.1007/s11128-016-1323-y.
Full textTamaddon, Sohail, Atif Ahmad, and Rachelle Bosua. "Secure Knowledge Management." International Journal of Cyber Warfare and Terrorism 5, no. 2 (2015): 1–20. http://dx.doi.org/10.4018/ijcwt.2015040101.
Full textvon Solms, Basie, and Emil Marais. "From secure wired networks to secure wireless networks – what are the extra risks?" Computers & Security 23, no. 8 (2004): 633–37. http://dx.doi.org/10.1016/j.cose.2004.09.005.
Full textAl-Fayyadh, Hayder. "ENHANCING QUALITY OF SERVICE IN MANET ENVIRONMENTS WITH CRYPTOGRAPHIC SECURE MECHANISMS TO SECURE SUSTAINABLE SMART CITIES." Journal of Engineering, Management and Information Technology 2, no. 4 (2024): 169–76. http://dx.doi.org/10.61552/jemit.2024.04.001.
Full textSadineni, Mr Giribabu, Janardhan Reddy D, B. Uma Pavani, K. Vijaya Lakshmi, Sk Karishma, and P. Tulasi. "Secure Aggregation of Data in Connection-Less Networks." International Journal of Innovative Research in Computer Science and Technology 11, no. 3 (2023): 85–89. http://dx.doi.org/10.55524/ijircst.2023.11.3.16.
Full textCapkun, S., and J. P. Hubaux. "Secure positioning in wireless networks." IEEE Journal on Selected Areas in Communications 24, no. 2 (2006): 221–32. http://dx.doi.org/10.1109/jsac.2005.861380.
Full textTseung, L. C. N. "Guaranteed, reliable, secure broadcast networks." IEEE Network 3, no. 6 (1989): 33–37. http://dx.doi.org/10.1109/65.39134.
Full textSun, Hung-Min, and Shiuh-Pyng Shieh. "Secure broadcasting in large networks." Computer Communications 21, no. 3 (1998): 279–83. http://dx.doi.org/10.1016/s0140-3664(97)00187-4.
Full textStevenson, Daniel, Nathan Hillery, and Greg Byrd. "Secure communications in ATM networks." Communications of the ACM 38, no. 2 (1995): 45–52. http://dx.doi.org/10.1145/204826.204844.
Full textMitchell, Chris J., and Fred C. Piper. "Key storage in secure networks." Discrete Applied Mathematics 21, no. 3 (1988): 215–28. http://dx.doi.org/10.1016/0166-218x(88)90068-6.
Full textChithra, M. R., and Manju K. Menon. "Secure domination of honeycomb networks." Journal of Combinatorial Optimization 40, no. 1 (2020): 98–109. http://dx.doi.org/10.1007/s10878-020-00570-8.
Full textSabnis, Suhasini, Marc Verbruggen, John Hickey, and Alan J. McBride. "Intrinsically Secure Next-Generation Networks." Bell Labs Technical Journal 17, no. 3 (2012): 17–36. http://dx.doi.org/10.1002/bltj.21556.
Full textEl Rouayheb, Salim, Emina Soljanin, and Alex Sprintson. "Secure Network Coding for Wiretap Networks of Type II." IEEE Transactions on Information Theory 58, no. 3 (2012): 1361–71. http://dx.doi.org/10.1109/tit.2011.2173631.
Full textMishra, Shailendra. "SDN-Based Secure Architecture for IoT." International Journal of Knowledge and Systems Science 11, no. 4 (2020): 1–16. http://dx.doi.org/10.4018/ijkss.2020100101.
Full textKulkumatagi, Savita S. "Secure Data Retrieval for Decentralized Disruption-Tolerent Military Networks." Bonfring International Journal of Software Engineering and Soft Computing 6, Special Issue (2016): 223–29. http://dx.doi.org/10.9756/bijsesc.8283.
Full textGuyeux, Christophe, Abdallah Makhoul, Ibrahim Atoui, Samar Tawbi, and Jacques M. Bahi. "A Complete Security Framework for Wireless Sensor Networks." International Journal of Information Technology and Web Engineering 10, no. 1 (2015): 47–74. http://dx.doi.org/10.4018/ijitwe.2015010103.
Full textGoldberg, Sharon, Michael Schapira, Pete Hummon, and Jennifer Rexford. "How secure are secure interdomain routing protocols?" Computer Networks 70 (September 2014): 260–87. http://dx.doi.org/10.1016/j.comnet.2014.05.007.
Full textJayabalan, E., and R. Pugazendi. "Generative Adversarial Networks for Secure Data Transmission in Wireless Network." Intelligent Automation & Soft Computing 35, no. 3 (2023): 3757–84. http://dx.doi.org/10.32604/iasc.2023.031200.
Full textWehbi, Rania, Ayman Kayssi, Ali Chehab, and Zaher Dawy. "Network Setup for Secure Routing in Inter-Vehicle Communication Networks." International Journal of Business Data Communications and Networking 2, no. 4 (2006): 1–17. http://dx.doi.org/10.4018/jbdcn.2006100101.
Full textHe, Hongliang, Shanxiang Lyu, Qinghao He, and Dongyang Xu. "Network Coding Assisted Secure Transmission in Full-Duplex Relay Networks." IEEE Transactions on Vehicular Technology 69, no. 8 (2020): 9196–200. http://dx.doi.org/10.1109/tvt.2020.3001871.
Full textNuñez Alvarez, José R., Yelena Pérez Zamora, Israel Benítez Pina, and Eliana Noriega Angarita. "Demilitarized network to secure the data stored in industrial networks." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 611. http://dx.doi.org/10.11591/ijece.v11i1.pp611-619.
Full textJoy, Joshua, Eric Chung, Zengwen Yuan, Jiayao Li, Leqi Zou, and Mario Gerla. "DiscoverFriends: secure social network communication in mobile ad hoc networks." Wireless Communications and Mobile Computing 16, no. 11 (2016): 1401–13. http://dx.doi.org/10.1002/wcm.2708.
Full textJosé, R. Nuñez Alvarez, Pérez Zamora Yelena, Benítez Pina Israel, and Noriega Angarita Eliana. "Demilitarized network to secure the data stored in industrial networks." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 611–19. https://doi.org/10.11591/ijece.v11i1.pp611-619.
Full textToral-Cruz, Homero, Debiao He, Albena D. Mihovska, Kim-Kwang Raymond Choo, and Muhammad Khurram Khan. "Reliable and Secure e-Health Networks." Wireless Personal Communications 117, no. 1 (2021): 1–6. http://dx.doi.org/10.1007/s11277-021-08104-z.
Full textSingh, Vikram, and Jaspal Ramola. "Secure Communications Over Wireless Broadcast Networks." Journal of Advance Research in Electrical & Electronics Engineering (ISSN: 2208-2395) 1, no. 4 (2014): 01–05. http://dx.doi.org/10.53555/nneee.v1i4.244.
Full textDalskov, Anders, Daniel Escudero, and Marcel Keller. "Secure Evaluation of Quantized Neural Networks." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 355–75. http://dx.doi.org/10.2478/popets-2020-0077.
Full textQi, Yue, and Mojtaba Vaezi. "Secure Transmission in MIMO-NOMA Networks." IEEE Communications Letters 24, no. 12 (2020): 2696–700. http://dx.doi.org/10.1109/lcomm.2020.3016999.
Full textLi, Bin, Zesong Fei, Yan Zhang, and Mohsen Guizani. "Secure UAV Communication Networks over 5G." IEEE Wireless Communications 26, no. 5 (2019): 114–20. http://dx.doi.org/10.1109/mwc.2019.1800458.
Full textDietzel, Stefan, Elmar Schoch, Bastian Konings, Michael Weber, and Frank Kargl. "Resilient secure aggregation for vehicular networks." IEEE Network 24, no. 1 (2010): 26–31. http://dx.doi.org/10.1109/mnet.2010.5395780.
Full textBrennan, Rob, Kevin Feeney, Yuqian Song, and Declan O'Sullivan. "Secure federated monitoring of heterogeneous networks." IEEE Communications Magazine 51, no. 11 (2013): 63–71. http://dx.doi.org/10.1109/mcom.2013.6658654.
Full textKang, Jiawen, Rong Yu, Sabita Maharjan, et al. "Toward secure energy harvesting cooperative networks." IEEE Communications Magazine 53, no. 8 (2015): 114–21. http://dx.doi.org/10.1109/mcom.2015.7180517.
Full textKim, Sung-Il, Il-Min Kim, and Jun Heo. "Secure Transmission for Multiuser Relay Networks." IEEE Transactions on Wireless Communications 14, no. 7 (2015): 3724–37. http://dx.doi.org/10.1109/twc.2015.2410776.
Full textWilliamson, J. "Review: Authentication Systems for Secure Networks." Computer Bulletin 39, no. 1 (1997): 27. http://dx.doi.org/10.1093/combul/39.1.27-a.
Full textCurtmola, Reza, and Cristina Nita-Rotaru. "Secure multicast routing in wireless networks." ACM SIGMOBILE Mobile Computing and Communications Review 11, no. 2 (2007): 55–56. http://dx.doi.org/10.1145/1282221.1282233.
Full textChi-Chun Lo and Yu-Jen Chen. "Secure communication mechanisms for GSM networks." IEEE Transactions on Consumer Electronics 45, no. 4 (1999): 1074–80. http://dx.doi.org/10.1109/30.809184.
Full textByres, E. J. "Designing secure networks for process control." IEEE Industry Applications Magazine 6, no. 5 (2000): 33–39. http://dx.doi.org/10.1109/2943.863633.
Full textGaneriwal, Saurabh, Christina Pöpper, Srdjan Čapkun, and Mani B. Srivastava. "Secure Time Synchronization in Sensor Networks." ACM Transactions on Information and System Security 11, no. 4 (2008): 1–35. http://dx.doi.org/10.1145/1380564.1380571.
Full textVon Solms, Basic. "Managing secure computer systems and networks." International Journal of Bio-Medical Computing 43, no. 1-2 (1996): 47–52. http://dx.doi.org/10.1016/s0020-7101(96)01226-3.
Full textCosta, Gabriele, Pierpaolo Degano, and Fabio Martinelli. "Secure service orchestration in open networks." Journal of Systems Architecture 57, no. 3 (2011): 231–39. http://dx.doi.org/10.1016/j.sysarc.2010.09.001.
Full textAvancha, Sasikanth, Jeffrey Undercoffer, Anupam Joshi, and John Pinkston. "Secure sensor networks for perimeter protection." Computer Networks 43, no. 4 (2003): 421–35. http://dx.doi.org/10.1016/s1389-1286(03)00352-9.
Full textChoudhury, Ashish, Arpita Patra, B. V. Ashwinkumar, Kannan Srinathan, and C. Pandu Rangan. "Secure message transmission in asynchronous networks." Journal of Parallel and Distributed Computing 71, no. 8 (2011): 1067–74. http://dx.doi.org/10.1016/j.jpdc.2011.03.004.
Full textAkhunzada, Adnan, Abdullah Gani, Nor Badrul Anuar, et al. "Secure and dependable software defined networks." Journal of Network and Computer Applications 61 (February 2016): 199–221. http://dx.doi.org/10.1016/j.jnca.2015.11.012.
Full textde la Piedra, Antonio, An Braeken, Abdellah Touhafi, and Karel Wouters. "Secure event logging in sensor networks." Computers & Mathematics with Applications 65, no. 5 (2013): 762–73. http://dx.doi.org/10.1016/j.camwa.2012.06.019.
Full textDyer, Martin, Trevor Fenner, Alan Frieze, and Andrew Thomason. "On key storage in secure networks." Journal of Cryptology 8, no. 4 (1995): 189–200. http://dx.doi.org/10.1007/bf00191355.
Full textRömmele, Stefan. "Automated Driving Calls for Secure Networks." ATZelektronik worldwide 10, no. 2 (2015): 12–17. http://dx.doi.org/10.1007/s38314-015-0517-x.
Full text