Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Exact matches
Likely matches
- International Conference on Mobile Computing and Networking (MobiCom)
- International Conference on Database and Expert Systems Applications (DEXA)
- Security and Privacy in Communication Networks (SecureComm)
- Security and Communication Networks
- International Journal of Communication Networks and Information Security (IJCNIS)
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 256 matches
- 2024
- Dongxiao Liu, Xuemin (Sherman) Shen:
Blockchain-Based Data Security in Heterogeneous Communications Networks. Wireless Networks, Springer 2024, ISBN 978-3-031-52476-9, pp. 1-189 - Kazi Yasin Islam, Iftekhar Ahmad, Yue Rong, Daryoush Habibi:
Joint Energy and Security Optimization in Underwater Wireless Communication Networks. IEEE Internet Things J. 11(8): 14282-14295 (2024) - Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam:
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks. CoRR abs/2403.20136 (2024) - 2023
- Hadi Yakan:
Security of V2X communications in 3GPP - 5G cellular networks. (Sécurité des communications V2X dans les réseaux cellulaires 5G - 3GPP). University of Paris-Saclay, France, 2023 - Yulong Shen, Yuanyu Zhang, Xiaohong Jiang:
Secrecy, Covertness and Authentication in Wireless Communications - Physical Layer Security Approach. Wireless Networks, Springer 2023, ISBN 978-3-031-38464-6, pp. 1-360 - Waqas Aman, Saif M. Al-Kuwari, Muhammad Muzzammil, Muhammad Mahboob Ur Rahman, Ambrish Kumar:
Security of underwater and air-water wireless communication: State-of-the-art, challenges and outlook. Ad Hoc Networks 142: 103114 (2023) - Ricardo de Andrade, Max Mauro Dias Santos, João Francisco Justo, Leopoldo Rideki Yoshioka, Hans-Joachim Hof, João Henrique Kleinschmidt:
Security architecture for automotive communication networks with CAN FD. Comput. Secur. 129: 103203 (2023) - Himanshu Sharma, Neeraj Kumar:
Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: A survey. Phys. Commun. 57: 102002 (2023) - Alaa M. Allakany, Abeer Saber, Samih Mohemmed Mostafa, Maazen Alsabaan, Mohamed I. Ibrahem, Haitham Elwahsh:
Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication. Sensors 23(12): 5703 (2023) - Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro:
Performance Analysis of Physical Layer Security in Power Line Communication Networks. ISCC 2023: 777-782 - Zhipeng Liu, Xi Li, Hong Ji, Heli Zhang:
Exploiting STAR-RIS for Physical Layer Security in Integrated Sensing and Communication Networks. PIMRC 2023: 1-6 - Ho Van Khuong:
Relaying Communications in Cognitive Radio Networks with Energy Scavenging and Artificial Noise: Reliability-Security Trade-off Analysis. SSP 2023: 646-650 - Jordan Gurren, Avanthika Vineetha Harish, Kimberly Tam, Kevin D. Jones:
Security Implications of a Satellite Communication Device on Wireless Networks Using Pentesting. WiMob 2023: 292-298 - Fengjun Li, Kaitai Liang, Zhiqiang Lin, Sokratis K. Katsikas:
Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 462, Springer 2023, ISBN 978-3-031-25537-3 [contents] - 2022
- Kai-Yun Tsao, Thomas Girdler, Vassilios G. Vassilakis:
A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks. Ad Hoc Networks 133: 102894 (2022) - Zhongxiang Wei, Fan Liu, Christos Masouros, Nanchi Su, Athina P. Petropulu:
Toward Multi-Functional 6G Wireless Networks: Integrating Sensing, Communication, and Security. IEEE Commun. Mag. 60(4): 65-71 (2022) - Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
Satellite-based communications security: A survey of threats, solutions, and research challenges. Comput. Networks 216: 109246 (2022) - R. Kishore, Iacovos Ioannou, Christophoros Christophorou, N. Prabagarane, Vasos Vassiliou, S. Vignesh, H. Vinayak, S. Venkatesh, Andreas Pitsillides:
A security protocol for D2D communications in 5G networks using elliptic curve cryptography. Int. J. Inf. Sec. 21(6): 1389-1408 (2022) - Meiling Li, Xiaoxia Yang, Fazlullah Khan, Mian Ahmad Jan, Wei Chen, Zhu Han:
Improving Physical Layer Security in Vehicles and Pedestrians Networks With Ambient Backscatter Communication. IEEE Trans. Intell. Transp. Syst. 23(7): 9380-9390 (2022) - Ki Chan, Yoohwan Kim, Ju-Yeon Jo:
DER Communication Networks and Their Security Issues. CCWC 2022: 785-790 - Jiani Fan, Lwin Khin Shar, Jiale Guo, Wenzhuo Yang, Dusit Niyato, Kwok-Yan Lam:
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks. NSS 2022: 283-304 - Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski:
Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings. Communications in Computer and Information Science 1663, Springer 2022, ISBN 978-981-19-7241-6 [contents] - Zongzheng Wang, Ping Dong:
NIMSA: Non-Interactive Multihoming Security Authentication Scheme for vehicular communications in Mobile Heterogeneous Networks. CoRR abs/2202.03808 (2022) - 2021
- Reyhane Attarian, Sattar Hashemi:
An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions. Comput. Networks 190: 107976 (2021) - Leonardo Babun, Kyle Denney, Z. Berkay Celik, Patrick D. McDaniel, A. Selcuk Uluagac:
A survey on IoT platforms: Communication, security, and privacy perspectives. Comput. Networks 192: 108040 (2021) - Weijia Lei, Yang Zhou, Xiuzhen Lin:
A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI. Digit. Commun. Networks 7(3): 352-361 (2021) - Rana Shaaban, Saleh Faruque:
An enhanced indoor visible light communication physical-layer security scheme for 5G networks: Survey, security challenges, and channel analysis secrecy performance. Int. J. Commun. Syst. 34(4) (2021) - Zheli Liu, Jin Li, Ilsun You, Siu-Ming Yiu:
Editorial: Security and Privacy in Computing and Communications. Mob. Networks Appl. 26(4): 1407-1411 (2021) - Zheng Xu, Ming Chen, Mingzhe Chen, Zhaohui Yang, Yihan Cang, H. Vincent Poor:
Physical Layer Security Optimization for MIMO Enabled Visible Light Communication Networks. GLOBECOM 2021: 1-6 - Joe Chou, Eyhab Al-Masri, Sergey Kanzhelev, Hossam Fattah:
Detecting Security and Privacy Risks in Microservices End-to-End Communication Using Neural Networks. ICKII 2021: 105-110
skipping 226 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 06:09 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint