To see the other types of publications on this topic, follow the link: Secure Networks.

Journal articles on the topic 'Secure Networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Secure Networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Elaine Shi and A. Perrig. "Designing Secure Sensor Networks." IEEE Wireless Communications 11, no. 6 (2004): 38–43. http://dx.doi.org/10.1109/mwc.2004.1368895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhan, Justin. "Secure Collaborative Social Networks." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40, no. 6 (2010): 682–89. http://dx.doi.org/10.1109/tsmcc.2010.2050879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Breeding, Marshall. "Designing secure library networks." Library Hi Tech 15, no. 1/2 (1997): 11–20. http://dx.doi.org/10.1108/07378839710306945.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kotzanikolaou, Panayiotis, Roza Mavropodi, Christos Douligeris, and Vassilios Chrissikopoulos. "Secure distributed intelligent networks." Computer Communications 29, no. 3 (2006): 325–36. http://dx.doi.org/10.1016/j.comcom.2004.12.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maivizhi, Radhakrishnan, and Palanichamy Yogesh. "Secure In-Network Aggregation in Wireless Sensor Networks." International Journal of Intelligent Information Technologies 16, no. 1 (2020): 49–74. http://dx.doi.org/10.4018/ijiit.2020010104.

Full text
Abstract:
In-network aggregation is a natural approach in wireless sensor networks (WSNs) to collaboratively process data generated by the sensor nodes. Besides processing, in-network aggregation also achieves effective energy consumption and bandwidth utilization. Since the sensing devices of a WSN are prone to a variety of attacks due to wireless communication and limited resources, secure in-network aggregation is a great challenge. This article proposes a secure in-network aggregation (SINA) protocol for additive aggregation functions. This protocol integrates privacy homomorphism (PH) and secret sh
APA, Harvard, Vancouver, ISO, and other styles
6

Shang, Tao, Jiao Li, and Jian-wei Liu. "Secure quantum network coding for controlled repeater networks." Quantum Information Processing 15, no. 7 (2016): 2937–53. http://dx.doi.org/10.1007/s11128-016-1323-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tamaddon, Sohail, Atif Ahmad, and Rachelle Bosua. "Secure Knowledge Management." International Journal of Cyber Warfare and Terrorism 5, no. 2 (2015): 1–20. http://dx.doi.org/10.4018/ijcwt.2015040101.

Full text
Abstract:
Human knowledge-sharing networks generate Intellectual Property and Trade Secrets that provide private enterprise with competitive advantages. Although considerable research has focused on increasing the knowledge-sharing outcomes of such networks, there has been comparatively less emphasis on examining the possibility of competitive erosion through knowledge leakage. This paper considers how to mitigate knowledge leakage by influencing the development of human knowledge sharing networks. The authors review the literatures of human knowledge sharing networks as well as information security man
APA, Harvard, Vancouver, ISO, and other styles
8

von Solms, Basie, and Emil Marais. "From secure wired networks to secure wireless networks – what are the extra risks?" Computers & Security 23, no. 8 (2004): 633–37. http://dx.doi.org/10.1016/j.cose.2004.09.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Fayyadh, Hayder. "ENHANCING QUALITY OF SERVICE IN MANET ENVIRONMENTS WITH CRYPTOGRAPHIC SECURE MECHANISMS TO SECURE SUSTAINABLE SMART CITIES." Journal of Engineering, Management and Information Technology 2, no. 4 (2024): 169–76. http://dx.doi.org/10.61552/jemit.2024.04.001.

Full text
Abstract:
The utilization of wireless sensor networks to gather, process, and act upon data may be a powerful tool in the development of a city-wide communication network that can accommodate many applications, ultimately leading to smart city solutions. Several challenges might be encountered by a smart city network. These include the need to adapt the network's coverage area to suit various applications, uneven distribution of nodes, a rise in message volume, the use of several communication technologies, and heterogeneity in both nodes and messages. There are many different facets of smart cities tha
APA, Harvard, Vancouver, ISO, and other styles
10

Sadineni, Mr Giribabu, Janardhan Reddy D, B. Uma Pavani, K. Vijaya Lakshmi, Sk Karishma, and P. Tulasi. "Secure Aggregation of Data in Connection-Less Networks." International Journal of Innovative Research in Computer Science and Technology 11, no. 3 (2023): 85–89. http://dx.doi.org/10.55524/ijircst.2023.11.3.16.

Full text
Abstract:
Reliable Minimal Energy Cost Routing (RMECR) and Reliable Minimum Energy Routing are two ingenious dynamism- conscious routing algorithms for wireless ad hoc networks (RMER). Ad hoc network conditions for dynamism effectiveness, responsibility, and dragging network continuance are all managed by RMECR. To develop dynamism-effective and reliable pathways that outstretch the network's functional continuance, it takes into account the bumps' dynamism operation, their remaining battery dynamism, and the tractability of their links. RMER, on the other phase, is a dynamism-effective routing algorith
APA, Harvard, Vancouver, ISO, and other styles
11

Capkun, S., and J. P. Hubaux. "Secure positioning in wireless networks." IEEE Journal on Selected Areas in Communications 24, no. 2 (2006): 221–32. http://dx.doi.org/10.1109/jsac.2005.861380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Tseung, L. C. N. "Guaranteed, reliable, secure broadcast networks." IEEE Network 3, no. 6 (1989): 33–37. http://dx.doi.org/10.1109/65.39134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Sun, Hung-Min, and Shiuh-Pyng Shieh. "Secure broadcasting in large networks." Computer Communications 21, no. 3 (1998): 279–83. http://dx.doi.org/10.1016/s0140-3664(97)00187-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Stevenson, Daniel, Nathan Hillery, and Greg Byrd. "Secure communications in ATM networks." Communications of the ACM 38, no. 2 (1995): 45–52. http://dx.doi.org/10.1145/204826.204844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Mitchell, Chris J., and Fred C. Piper. "Key storage in secure networks." Discrete Applied Mathematics 21, no. 3 (1988): 215–28. http://dx.doi.org/10.1016/0166-218x(88)90068-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Chithra, M. R., and Manju K. Menon. "Secure domination of honeycomb networks." Journal of Combinatorial Optimization 40, no. 1 (2020): 98–109. http://dx.doi.org/10.1007/s10878-020-00570-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Sabnis, Suhasini, Marc Verbruggen, John Hickey, and Alan J. McBride. "Intrinsically Secure Next-Generation Networks." Bell Labs Technical Journal 17, no. 3 (2012): 17–36. http://dx.doi.org/10.1002/bltj.21556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

El Rouayheb, Salim, Emina Soljanin, and Alex Sprintson. "Secure Network Coding for Wiretap Networks of Type II." IEEE Transactions on Information Theory 58, no. 3 (2012): 1361–71. http://dx.doi.org/10.1109/tit.2011.2173631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Mishra, Shailendra. "SDN-Based Secure Architecture for IoT." International Journal of Knowledge and Systems Science 11, no. 4 (2020): 1–16. http://dx.doi.org/10.4018/ijkss.2020100101.

Full text
Abstract:
Internet of things (IoT) means connecting things through the internet. The growing market for IoT also attracts malicious individuals trying to gain access to the marketplace. Security issues are among the most significant worries in companies that rely on the cloud of things to do business. SDN-based architecture has improved the security of IoT networks. The centralized controller is responsible for managing the critical network's operations, and growing the network size increases the network load in the controller. Controllers in SDN-based architecture are still facing security challenges s
APA, Harvard, Vancouver, ISO, and other styles
20

Kulkumatagi, Savita S. "Secure Data Retrieval for Decentralized Disruption-Tolerent Military Networks." Bonfring International Journal of Software Engineering and Soft Computing 6, Special Issue (2016): 223–29. http://dx.doi.org/10.9756/bijsesc.8283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Guyeux, Christophe, Abdallah Makhoul, Ibrahim Atoui, Samar Tawbi, and Jacques M. Bahi. "A Complete Security Framework for Wireless Sensor Networks." International Journal of Information Technology and Web Engineering 10, no. 1 (2015): 47–74. http://dx.doi.org/10.4018/ijitwe.2015010103.

Full text
Abstract:
Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompt a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. Till now, most of the security approaches proposed for sensor networks present single solution for particular and single problem. Therefore, to address the special security needs of sensor networks as a whole we introduce a security framework. In their framework
APA, Harvard, Vancouver, ISO, and other styles
22

Goldberg, Sharon, Michael Schapira, Pete Hummon, and Jennifer Rexford. "How secure are secure interdomain routing protocols?" Computer Networks 70 (September 2014): 260–87. http://dx.doi.org/10.1016/j.comnet.2014.05.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Jayabalan, E., and R. Pugazendi. "Generative Adversarial Networks for Secure Data Transmission in Wireless Network." Intelligent Automation & Soft Computing 35, no. 3 (2023): 3757–84. http://dx.doi.org/10.32604/iasc.2023.031200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Wehbi, Rania, Ayman Kayssi, Ali Chehab, and Zaher Dawy. "Network Setup for Secure Routing in Inter-Vehicle Communication Networks." International Journal of Business Data Communications and Networking 2, no. 4 (2006): 1–17. http://dx.doi.org/10.4018/jbdcn.2006100101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

He, Hongliang, Shanxiang Lyu, Qinghao He, and Dongyang Xu. "Network Coding Assisted Secure Transmission in Full-Duplex Relay Networks." IEEE Transactions on Vehicular Technology 69, no. 8 (2020): 9196–200. http://dx.doi.org/10.1109/tvt.2020.3001871.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Nuñez Alvarez, José R., Yelena Pérez Zamora, Israel Benítez Pina, and Eliana Noriega Angarita. "Demilitarized network to secure the data stored in industrial networks." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 611. http://dx.doi.org/10.11591/ijece.v11i1.pp611-619.

Full text
Abstract:
Currently, the data and variables of a control system are the most important elements to be safeguarded in an industrial network, so it is vitally important to ensure their safety. This paper presents the design and simulation of a demilitarized network (DMZ) using firewalls to control access to all the information that is stored in the servers of the industrial network of the Hermanos Díaz Refinery in Santiago de Cuba, Cuba. In addition, the characteristics, configurations, methods, and rules of DMZs and firewalls are shown, select the configuration with three multi-legged firewalls as the mo
APA, Harvard, Vancouver, ISO, and other styles
27

Joy, Joshua, Eric Chung, Zengwen Yuan, Jiayao Li, Leqi Zou, and Mario Gerla. "DiscoverFriends: secure social network communication in mobile ad hoc networks." Wireless Communications and Mobile Computing 16, no. 11 (2016): 1401–13. http://dx.doi.org/10.1002/wcm.2708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

José, R. Nuñez Alvarez, Pérez Zamora Yelena, Benítez Pina Israel, and Noriega Angarita Eliana. "Demilitarized network to secure the data stored in industrial networks." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 611–19. https://doi.org/10.11591/ijece.v11i1.pp611-619.

Full text
Abstract:
Currently, the data and variables of a control system are the most important elements to be safeguarded in an industrial network, so it is vitally important to ensure their safety. This paper presents the design and simulation of a demilitarized network (DMZ) using firewalls to control access to all the information that is stored in the servers of the industrial network of the Hermanos Díaz Refinery in Santiago de Cuba, Cuba. In addition, the characteristics, configurations, methods, and rules of DMZs and firewalls are shown, select the configuration with three multi-legged firewalls as
APA, Harvard, Vancouver, ISO, and other styles
29

Toral-Cruz, Homero, Debiao He, Albena D. Mihovska, Kim-Kwang Raymond Choo, and Muhammad Khurram Khan. "Reliable and Secure e-Health Networks." Wireless Personal Communications 117, no. 1 (2021): 1–6. http://dx.doi.org/10.1007/s11277-021-08104-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Singh, Vikram, and Jaspal Ramola. "Secure Communications Over Wireless Broadcast Networks." Journal of Advance Research in Electrical & Electronics Engineering (ISSN: 2208-2395) 1, no. 4 (2014): 01–05. http://dx.doi.org/10.53555/nneee.v1i4.244.

Full text
Abstract:
Wireless telecommunications is the transfer of information between two or more points that are not physically connected. Distances can be short, such as a few meters for television remote control, or as far as thousands or even millions of kilometers for deep-space radio communications. In this paper wireless broadcast network model(WBN) with secrecy constraints is investigated, in which a source node broadcasts confidential message flows to user nodes, with each message intended to be decoded accurately by one user and to be kept secret from all other users. In the existing system we develope
APA, Harvard, Vancouver, ISO, and other styles
31

Dalskov, Anders, Daniel Escudero, and Marcel Keller. "Secure Evaluation of Quantized Neural Networks." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 355–75. http://dx.doi.org/10.2478/popets-2020-0077.

Full text
Abstract:
AbstractWe investigate two questions in this paper: First, we ask to what extent “MPC friendly” models are already supported by major Machine Learning frameworks such as TensorFlow or PyTorch. Prior works provide protocols that only work on fixed-point integers and specialized activation functions, two aspects that are not supported by popular Machine Learning frameworks, and the need for these specialized model representations means that it is hard, and often impossible, to use e.g., TensorFlow to design, train and test models that later have to be evaluated securely. Second, we ask to what e
APA, Harvard, Vancouver, ISO, and other styles
32

Qi, Yue, and Mojtaba Vaezi. "Secure Transmission in MIMO-NOMA Networks." IEEE Communications Letters 24, no. 12 (2020): 2696–700. http://dx.doi.org/10.1109/lcomm.2020.3016999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Li, Bin, Zesong Fei, Yan Zhang, and Mohsen Guizani. "Secure UAV Communication Networks over 5G." IEEE Wireless Communications 26, no. 5 (2019): 114–20. http://dx.doi.org/10.1109/mwc.2019.1800458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Dietzel, Stefan, Elmar Schoch, Bastian Konings, Michael Weber, and Frank Kargl. "Resilient secure aggregation for vehicular networks." IEEE Network 24, no. 1 (2010): 26–31. http://dx.doi.org/10.1109/mnet.2010.5395780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Brennan, Rob, Kevin Feeney, Yuqian Song, and Declan O'Sullivan. "Secure federated monitoring of heterogeneous networks." IEEE Communications Magazine 51, no. 11 (2013): 63–71. http://dx.doi.org/10.1109/mcom.2013.6658654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kang, Jiawen, Rong Yu, Sabita Maharjan, et al. "Toward secure energy harvesting cooperative networks." IEEE Communications Magazine 53, no. 8 (2015): 114–21. http://dx.doi.org/10.1109/mcom.2015.7180517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kim, Sung-Il, Il-Min Kim, and Jun Heo. "Secure Transmission for Multiuser Relay Networks." IEEE Transactions on Wireless Communications 14, no. 7 (2015): 3724–37. http://dx.doi.org/10.1109/twc.2015.2410776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Williamson, J. "Review: Authentication Systems for Secure Networks." Computer Bulletin 39, no. 1 (1997): 27. http://dx.doi.org/10.1093/combul/39.1.27-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Curtmola, Reza, and Cristina Nita-Rotaru. "Secure multicast routing in wireless networks." ACM SIGMOBILE Mobile Computing and Communications Review 11, no. 2 (2007): 55–56. http://dx.doi.org/10.1145/1282221.1282233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Chi-Chun Lo and Yu-Jen Chen. "Secure communication mechanisms for GSM networks." IEEE Transactions on Consumer Electronics 45, no. 4 (1999): 1074–80. http://dx.doi.org/10.1109/30.809184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Byres, E. J. "Designing secure networks for process control." IEEE Industry Applications Magazine 6, no. 5 (2000): 33–39. http://dx.doi.org/10.1109/2943.863633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ganeriwal, Saurabh, Christina Pöpper, Srdjan Čapkun, and Mani B. Srivastava. "Secure Time Synchronization in Sensor Networks." ACM Transactions on Information and System Security 11, no. 4 (2008): 1–35. http://dx.doi.org/10.1145/1380564.1380571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Von Solms, Basic. "Managing secure computer systems and networks." International Journal of Bio-Medical Computing 43, no. 1-2 (1996): 47–52. http://dx.doi.org/10.1016/s0020-7101(96)01226-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Costa, Gabriele, Pierpaolo Degano, and Fabio Martinelli. "Secure service orchestration in open networks." Journal of Systems Architecture 57, no. 3 (2011): 231–39. http://dx.doi.org/10.1016/j.sysarc.2010.09.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Avancha, Sasikanth, Jeffrey Undercoffer, Anupam Joshi, and John Pinkston. "Secure sensor networks for perimeter protection." Computer Networks 43, no. 4 (2003): 421–35. http://dx.doi.org/10.1016/s1389-1286(03)00352-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Choudhury, Ashish, Arpita Patra, B. V. Ashwinkumar, Kannan Srinathan, and C. Pandu Rangan. "Secure message transmission in asynchronous networks." Journal of Parallel and Distributed Computing 71, no. 8 (2011): 1067–74. http://dx.doi.org/10.1016/j.jpdc.2011.03.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Akhunzada, Adnan, Abdullah Gani, Nor Badrul Anuar, et al. "Secure and dependable software defined networks." Journal of Network and Computer Applications 61 (February 2016): 199–221. http://dx.doi.org/10.1016/j.jnca.2015.11.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

de la Piedra, Antonio, An Braeken, Abdellah Touhafi, and Karel Wouters. "Secure event logging in sensor networks." Computers & Mathematics with Applications 65, no. 5 (2013): 762–73. http://dx.doi.org/10.1016/j.camwa.2012.06.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Dyer, Martin, Trevor Fenner, Alan Frieze, and Andrew Thomason. "On key storage in secure networks." Journal of Cryptology 8, no. 4 (1995): 189–200. http://dx.doi.org/10.1007/bf00191355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Römmele, Stefan. "Automated Driving Calls for Secure Networks." ATZelektronik worldwide 10, no. 2 (2015): 12–17. http://dx.doi.org/10.1007/s38314-015-0517-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!