default search action
Search dblp for Publications
export results for "efficient security mechanism"
@article{DBLP:journals/mta/KumarSS24, author = {Pawan Kumar and Sukhdip Singh and Suman}, title = {An efficient security testing mechanism for Android Apps based on malware analysis and optimized XGBoost}, journal = {Multim. Tools Appl.}, volume = {83}, number = {24}, pages = {64767--64794}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-18066-y}, doi = {10.1007/S11042-023-18066-Y}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/KumarSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/SrivastavaPA24, author = {Atul Kumar Srivastava and Dhiraj Pandey and Alok Agarwal}, title = {An Enhanced {D} Level Cut-Off Point-Quantum Secret Sharing Access Structure Scheme Based Efficient Monitoring Key Ciphertext Attributes with Encryption Access Control with Blockchain and Key Mechanism for Security in Cloud Computing}, journal = {Wirel. Pers. Commun.}, volume = {135}, number = {1}, pages = {367--387}, year = {2024}, url = {https://doi.org/10.1007/s11277-024-11021-6}, doi = {10.1007/S11277-024-11021-6}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/SrivastavaPA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LaghariMAAK23, author = {Sham{-}ul{-}Arfeen Laghari and Selvakumar Manickam and Ayman Khallel Ibrahim Al{-}Ani and Mahmood A. Al{-}Shareeda and Shankar Karuppayah}, title = {{ES-SECS/GEM:} An Efficient Security Mechanism for {SECS/GEM} Communications}, journal = {{IEEE} Access}, volume = {11}, pages = {31813--31828}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3262310}, doi = {10.1109/ACCESS.2023.3262310}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LaghariMAAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/WangHYLL23, author = {Yuhang Wang and Ying He and F. Richard Yu and Qiuzhen Lin and Victor C. M. Leung}, title = {Efficient Resource Allocation in Multi-UAV Assisted Vehicular Networks With Security Constraint and Attention Mechanism}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {22}, number = {7}, pages = {4802--4813}, year = {2023}, url = {https://doi.org/10.1109/TWC.2022.3229013}, doi = {10.1109/TWC.2022.3229013}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/WangHYLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/SpinaR23, author = {Mattia Giovanni Spina and Floriano De Rango}, title = {Lightweight, Dynamic and Energy Efficient Security Mechanism for constrained IoT devices using CoAP}, booktitle = {20th {IEEE} Consumer Communications {\&} Networking Conference, {CCNC} 2023, Las Vegas, NV, USA, January 8-11, 2023}, pages = {1123--1128}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CCNC51644.2023.10059854}, doi = {10.1109/CCNC51644.2023.10059854}, timestamp = {Tue, 21 Mar 2023 13:49:39 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/SpinaR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Alqahtani20, author = {Abdulrahman Saad Alqahtani}, title = {Security threats and countermeasures in software defined network using efficient and secure trusted routing mechanism}, journal = {Comput. Commun.}, volume = {153}, pages = {336--341}, year = {2020}, url = {https://doi.org/10.1016/j.comcom.2020.02.020}, doi = {10.1016/J.COMCOM.2020.02.020}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/Alqahtani20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/RoutSPSD20, author = {Sidhartha Sankar Rout and Akshat Singh and Suyog Bhimrao Patil and Mitali Sinha and Sujay Deb}, title = {Security Threats in Channel Access Mechanism of Wireless NoC and Efficient Countermeasures}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2020, Sevilla, Spain, October 10-21, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISCAS45731.2020.9180581}, doi = {10.1109/ISCAS45731.2020.9180581}, timestamp = {Mon, 18 Jan 2021 08:38:59 +0100}, biburl = {https://dblp.org/rec/conf/iscas/RoutSPSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dga/FarhadiTTG19, author = {Farzaneh Farhadi and Hamidreza Tavafoghi and Demosthenis Teneketzis and S. Jamaloddin Golestani}, title = {An Efficient Dynamic Allocation Mechanism for Security in Networks of Interdependent Strategic Agents}, journal = {Dyn. Games Appl.}, volume = {9}, number = {4}, pages = {914--941}, year = {2019}, url = {https://doi.org/10.1007/s13235-018-0284-4}, doi = {10.1007/S13235-018-0284-4}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dga/FarhadiTTG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/VatchalaRS19, author = {S. Vatchala and S. Ravimaran and A. Sathish}, title = {Auto Sec {SDN-XTR:} {A} Hybrid End to End Security Mechanism with Efficient Trace Representation on Open Stack Cloud}, journal = {J. Inf. Sci. Eng.}, volume = {35}, number = {3}, pages = {697--718}, year = {2019}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=168\_2245}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/VatchalaRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai2/VladutaBP19, author = {Valentin{-}Alexandru Vladuta and Ion Bica and Victor Valeriu Patriciu}, title = {Energy Efficient Trust-Based Security Mechanism for Wireless Sensors and Unmanned Aerial Vehicles}, booktitle = {11th International Conference on Electronics, Computers and Artificial Intelligence, {ECAI} 2019, Pitesti, Romania, June 27-29, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ECAI46879.2019.9041986}, doi = {10.1109/ECAI46879.2019.9041986}, timestamp = {Tue, 05 Apr 2022 15:53:07 +0200}, biburl = {https://dblp.org/rec/conf/ecai2/VladutaBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Yitbarek18, author = {Salessawi Ferede Yitbarek}, title = {Hardware Mechanisms for Efficient Memory System Security}, school = {University of Michigan, {USA}}, year = {2018}, url = {https://hdl.handle.net/2027.42/147604}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Yitbarek18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/BansalNG18, author = {Ritesh Bansal and Chander Kumar Nagpal and Shailender Gupta}, title = {An efficient hybrid security mechanism based on chaos and improved {BPCS}}, journal = {Multim. Tools Appl.}, volume = {77}, number = {6}, pages = {6799--6835}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4600-6}, doi = {10.1007/S11042-017-4600-6}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/BansalNG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wac2/YazdandoostKKS18, author = {Ali Yazdandoost and Peyman Khazaei and Rahim Kamali and Salar Saadatian}, title = {An Efficient Scheduling for Security Constraint Unit Commitment Problem Via Modified Genetic Algorithm Based on Multicellular Organisms Mechanisms}, booktitle = {2018 World Automation Congress, {WAC} 2018, Stevenson, WA, USA, June 3-6, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/WAC.2018.8430391}, doi = {10.23919/WAC.2018.8430391}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/wac2/YazdandoostKKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-07915, author = {Ali Yazdandoost and Peyman Khazaei and Rahim Kamali and Salar Saadatian}, title = {An Efficient Scheduling for Security Constraint Unit Commitment Problem Via Modified Genetic Algorithm Based on Multicellular Organisms Mechanisms}, journal = {CoRR}, volume = {abs/1806.07915}, year = {2018}, url = {http://arxiv.org/abs/1806.07915}, eprinttype = {arXiv}, eprint = {1806.07915}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-07915.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HellaouiKB17, author = {Hamed Hellaoui and Mouloud Koudil and Abdelmadjid Bouabdallah}, title = {Energy-efficient mechanisms in security of the internet of things: {A} survey}, journal = {Comput. Networks}, volume = {127}, pages = {173--189}, year = {2017}, url = {https://doi.org/10.1016/j.comnet.2017.08.006}, doi = {10.1016/J.COMNET.2017.08.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HellaouiKB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/ArshadNAN17, author = {Hamed Arshad and Morteza Nikooghadam and Sara Avezverdi and Mahboubeh Nazari}, title = {Design and {FPGA} implementation of an efficient security mechanism for mobile pay-TV systems}, journal = {Int. J. Commun. Syst.}, volume = {30}, number = {15}, year = {2017}, url = {https://doi.org/10.1002/dac.3305}, doi = {10.1002/DAC.3305}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/ArshadNAN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/PuthalNRC17, author = {Deepak Puthal and Surya Nepal and Rajiv Ranjan and Jinjun Chen}, title = {A dynamic prime number based efficient security mechanism for big sensing data streams}, journal = {J. Comput. Syst. Sci.}, volume = {83}, number = {1}, pages = {22--42}, year = {2017}, url = {https://doi.org/10.1016/j.jcss.2016.02.005}, doi = {10.1016/J.JCSS.2016.02.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/PuthalNRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HanataniHMY16, author = {Yoshikazu Hanatani and Goichiro Hanaoka and Takahiro Matsuda and Takashi Yamakawa}, title = {Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models}, journal = {Secur. Commun. Networks}, volume = {9}, number = {12}, pages = {1676--1697}, year = {2016}, url = {https://doi.org/10.1002/sec.1444}, doi = {10.1002/SEC.1444}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HanataniHMY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictcsdm/VinodV16, author = {D. Franklin Vinod and V. Vasudevan}, editor = {S. Arumugam and Jay S. Bagga and Lowell W. Beineke and B. S. Panda}, title = {A Bi-level Security Mechanism for Efficient Protection on Graphs in Online Social Network}, booktitle = {Theoretical Computer Science and Discrete Mathematics - First International Conference, {ICTCSDM} 2016, Krishnankoil, India, December 19-21, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10398}, pages = {69--75}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-64419-6\_9}, doi = {10.1007/978-3-319-64419-6\_9}, timestamp = {Fri, 11 Jun 2021 08:27:11 +0200}, biburl = {https://dblp.org/rec/conf/ictcsdm/VinodV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wuwnet/IbragimovLKNPYK14, author = {Mukhridinkhon Ibragimov and Jae{-}Hoon Lee and Muppalla Kalyani and Jung{-}Il Namgung and Soo{-}Hyun Park and Ok Yeon Yi and Changhwa Kim}, editor = {Chiara Petrioli and Tommaso Melodia and Fumin Zhang and Zhengdao Wang and Jo{\~{a}}o Gomes and Wencen Wu}, title = {An Energy efficient {CCM-UW} security mechanism for Underwater Acoustic Networks}, booktitle = {Proceedings of the International Conference on Underwater Networks {\&} Systems, Rome, Italy, November 12 - 14, 2014}, pages = {41:1--41:2}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2671490.2674578}, doi = {10.1145/2671490.2674578}, timestamp = {Wed, 25 Mar 2020 13:28:30 +0100}, biburl = {https://dblp.org/rec/conf/wuwnet/IbragimovLKNPYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/AliK13, author = {Aftab Ali and Farrukh Aslam Khan}, title = {Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2013}, pages = {216}, year = {2013}, url = {https://doi.org/10.1186/1687-1499-2013-216}, doi = {10.1186/1687-1499-2013-216}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/AliK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/BenkhelifaFW13, author = {Elhadj Benkhelifa and Dayan Abishek Fernando and Thomas Welsh}, title = {A Novel Cloud-Based Multi-Tenancy Architecture with Efficient Hybrid Authentication Mechanism for Enhanced Security and Resource Optimization}, journal = {Int. J. Cloud Appl. Comput.}, volume = {3}, number = {3}, pages = {34--49}, year = {2013}, url = {https://doi.org/10.4018/ijcac.2013070103}, doi = {10.4018/IJCAC.2013070103}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/BenkhelifaFW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Schlake12, author = {Fari Schlake}, title = {Optimal Consumer-Centric Delay-Efficient Security Management in Multi-Agent Networks: {A} Game and Mechanism Design Theoretic Approach}, school = {Virginia Tech, Blacksburg, VA, {USA}}, year = {2012}, url = {http://hdl.handle.net/10919/77362}, timestamp = {Tue, 23 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Schlake12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/Sahoo12, author = {Prasan Kumar Sahoo}, title = {Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks}, journal = {Sensors}, volume = {12}, number = {9}, pages = {12606--12633}, year = {2012}, url = {https://doi.org/10.3390/s120912606}, doi = {10.3390/S120912606}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/Sahoo12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndt/BoubicheBA12, author = {Djallel Eddine Boubiche and Azeddine Bilami and Samir Athmani}, editor = {Rachid Benlamri}, title = {A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor Network}, booktitle = {Networked Digital Technologies - 4th International Conference, {NDT} 2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {294}, pages = {151--164}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30567-2\_13}, doi = {10.1007/978-3-642-30567-2\_13}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndt/BoubicheBA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-0380, title = {An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/1111.0380}, year = {2011}, note = {Withdrawn.}, url = {http://arxiv.org/abs/1111.0380}, eprinttype = {arXiv}, eprint = {1111.0380}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-0380.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/baip/RuckmaniS10, author = {V. Ruckmani and G. Sudha Sadasivam}, editor = {Vinu V. Das and R. Vijayakumar and Narayan C. Debnath and Janahanlal Stephen and Natarajan Meghanathan and Suresh Sankaranarayanan and P. M. Thankachan and Ford Lumban Gaol and Nessy Thankachan}, title = {Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security}, booktitle = {Information Processing and Management - International Conference on Recent Trends in Business Administration and Information Processing, {BAIP} 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {70}, pages = {125--129}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12214-9\_22}, doi = {10.1007/978-3-642-12214-9\_22}, timestamp = {Thu, 01 Jun 2017 18:59:02 +0200}, biburl = {https://dblp.org/rec/conf/baip/RuckmaniS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/SawazakiMY10, author = {Junya Sawazaki and Toshiyuki Maeda and Akinori Yonezawa}, editor = {Yutaka Ishikawa and Dong Tang and Hiroshi Nakamura}, title = {Implementing a Hybrid Virtual Machine Monitor for Flexible and Efficient Security Mechanisms}, booktitle = {16th {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2010, Tokyo, Japan, December 13-15, 2010}, pages = {37--46}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/PRDC.2010.32}, doi = {10.1109/PRDC.2010.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/SawazakiMY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-2516, author = {Jaydip Sen}, title = {An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/1012.2516}, year = {2010}, url = {http://arxiv.org/abs/1012.2516}, eprinttype = {arXiv}, eprint = {1012.2516}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-2516.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/HussainKMP09, author = {Sajid Hussain and Firdous Kausar and Ashraf Masood and Jong Hyuk Park}, title = {An efficient collusion resistant security mechanism for heterogeneous sensor networks}, journal = {Internet Res.}, volume = {19}, number = {2}, pages = {227--245}, year = {2009}, url = {https://doi.org/10.1108/10662240910952364}, doi = {10.1108/10662240910952364}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/intr/HussainKMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LeePRG09, author = {Li{-}Te Lee and Yu{-}Ting Pai and Shanq{-}Jang Ruan and J{\"{u}}rgen G{\"{o}}tze}, title = {An energy efficient and high securitywatermarking mechanism based on {DS-CDMA}}, booktitle = {Proceedings of the 2009 {IEEE} International Conference on Multimedia and Expo, {ICME} 2009, June 28 - July 2, 2009, New York City, NY, {USA}}, pages = {1190--1193}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICME.2009.5202713}, doi = {10.1109/ICME.2009.5202713}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/LeePRG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/YanO09, author = {Gongjun Yan and Stephan Olariu}, title = {An Efficient Geographic Location-based Security Mechanism for Vehicular Adhoc Networks}, booktitle = {{IEEE} 6th International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2009, 12-15 October 2009, Macau (S.A.R.), China}, pages = {804--809}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MOBHOC.2009.5336914}, doi = {10.1109/MOBHOC.2009.5336914}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/YanO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ChenWHC08, author = {Chi{-}Yuan Chen and Tin Yu Wu and Yueh{-}Min Huang and Han{-}Chieh Chao}, title = {An efficient end-to-end security mechanism for {IP} multimedia subsystem}, journal = {Comput. Commun.}, volume = {31}, number = {18}, pages = {4259--4268}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2008.05.025}, doi = {10.1016/J.COMCOM.2008.05.025}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ChenWHC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZhuYLSJ07, author = {Sencun Zhu and Chao Yao and Donggang Liu and Sanjeev Setia and Sushil Jajodia}, title = {Efficient security mechanisms for overlay multicast based content delivery}, journal = {Comput. Commun.}, volume = {30}, number = {4}, pages = {793--806}, year = {2007}, url = {https://doi.org/10.1016/j.comcom.2006.10.003}, doi = {10.1016/J.COMCOM.2006.10.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ZhuYLSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/TraynorKCCZP07, author = {Patrick Traynor and Raju Kumar and Heesook Choi and Guohong Cao and Sencun Zhu and Thomas La Porta}, title = {Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {6}, number = {6}, pages = {663--677}, year = {2007}, url = {https://doi.org/10.1109/TMC.2007.1020}, doi = {10.1109/TMC.2007.1020}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/TraynorKCCZP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/ZhuSJ06, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia}, title = {{LEAP+:} Efficient security mechanisms for large-scale distributed sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {2}, number = {4}, pages = {500--528}, year = {2006}, url = {https://doi.org/10.1145/1218556.1218559}, doi = {10.1145/1218556.1218559}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosn/ZhuSJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/TraynorKSCP06, author = {Patrick Traynor and Raju Kumar and Hussain Bin Saad and Guohong Cao and Thomas La Porta}, editor = {Per Gunningberg and Lars{-}{\AA}ke Larzon and Mahadev Satyanarayanan and Nigel Davies}, title = {{LIGER:} implementing efficient hybrid security mechanisms for heterogeneous sensor networks}, booktitle = {Proceedings of the 4th International Conference on Mobile Systems, Applications, and Services (MobiSys 2006), Uppsala, Sweden, June 19-22, 2006}, pages = {15--27}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134680.1134683}, doi = {10.1145/1134680.1134683}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/TraynorKSCP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhuYLSJ05, author = {Sencun Zhu and Chao Yao and Donggang Liu and Sanjeev Setia and Sushil Jajodia}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {40--55}, year = {2005}, url = {https://doi.org/10.1007/11496137\_4}, doi = {10.1007/11496137\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ZhuYLSJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/HuhLMC05, author = {Eui{-}nam Huh and Seung{-}Yeon Lee and Youngsong Mun and Hyunseung Choo}, editor = {Hamid R. Arabnia}, title = {An Efficient Authentication Mechanism on Ad-Hoc Telematics Environment}, booktitle = {Proceedings of The 2005 International Conference on Security and Management, {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005}, pages = {348--356}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Wed, 06 Dec 2006 10:55:26 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/HuhLMC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icita/SahooCS05, author = {Prasan Kumar Sahoo and Jonathan Jen{-}Rong Chen and Ping{-}Tai Sun}, title = {Efficient Security Mechanisms for the Distributed Wireless Sensor Networks}, booktitle = {Third International Conference on Information Technology and Applications {(ICITA} 2005), 4-7 July 2005, Sydney, Australia}, pages = {541--546}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICITA.2005.124}, doi = {10.1109/ICITA.2005.124}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icita/SahooCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skg/DaiCZX05, author = {Honglei Dai and Shuoying Chen and Li Zha and Zhiwei Xu}, title = {Efficient and Loosely Coupled Security Mechanism in Vega Grid}, booktitle = {2005 International Conference on Semantics, Knowledge and Grid {(SKG} 2005), 27-29 November 2005, Beijing, China}, pages = {76}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SKG.2005.69}, doi = {10.1109/SKG.2005.69}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skg/DaiCZX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/Dressler05, author = {Falko Dressler}, editor = {Matthias Bossardt and Georg Carle and David Hutchison and Hermann de Meer and Bernhard Plattner}, title = {Bio-inspired mechanisms for efficient and adaptive network security mechanisms}, booktitle = {Service Management and Self-Organization in IP-based Networks}, series = {Dagstuhl Seminar Proceedings}, volume = {04411}, publisher = {IBFI, Schloss Dagstuhl, Germany}, year = {2005}, url = {http://drops.dagstuhl.de/opus/volltexte/2005/87}, timestamp = {Mon, 26 Sep 2022 16:14:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/Dressler05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuSJ03, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {{LEAP:} efficient security mechanisms for large-scale distributed sensor networks}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {62--72}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948120}, doi = {10.1145/948109.948120}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HuPJ03, author = {Yih{-}Chun Hu and Adrian Perrig and David B. Johnson}, title = {Efficient Security Mechanisms for Routing Protocolsa}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2003, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2003}, url = {https://www.ndss-symposium.org/ndss2003/efficient-security-mechanisms-for-routing-protocols/}, timestamp = {Mon, 01 Feb 2021 08:42:24 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HuPJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/ZhuSJ03, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia}, editor = {Ian F. Akyildiz and Deborah Estrin and David E. Culler and Mani B. Srivastava}, title = {{LEAP} - efficient security mechanisms for large-scale distributed sensor networks}, booktitle = {Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys 2003, Los Angeles, California, USA, November 5-7, 2003}, pages = {308--309}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/958491.958534}, doi = {10.1145/958491.958534}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sensys/ZhuSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SmithG98, author = {Bradley R. Smith and J. J. Garcia{-}Luna{-}Aceves}, title = {Efficient security mechanisms for the border gateway routing protocol}, journal = {Comput. Commun.}, volume = {21}, number = {3}, pages = {203--210}, year = {1998}, url = {https://doi.org/10.1016/S0140-3664(97)00186-2}, doi = {10.1016/S0140-3664(97)00186-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/SmithG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.