Search dblp for Publications

export results for "efficient security mechanism"

 download as .bib file

@article{DBLP:journals/mta/KumarSS24,
  author       = {Pawan Kumar and
                  Sukhdip Singh and
                  Suman},
  title        = {An efficient security testing mechanism for Android Apps based on
                  malware analysis and optimized XGBoost},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {24},
  pages        = {64767--64794},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-18066-y},
  doi          = {10.1007/S11042-023-18066-Y},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/KumarSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/SrivastavaPA24,
  author       = {Atul Kumar Srivastava and
                  Dhiraj Pandey and
                  Alok Agarwal},
  title        = {An Enhanced {D} Level Cut-Off Point-Quantum Secret Sharing Access
                  Structure Scheme Based Efficient Monitoring Key Ciphertext Attributes
                  with Encryption Access Control with Blockchain and Key Mechanism for
                  Security in Cloud Computing},
  journal      = {Wirel. Pers. Commun.},
  volume       = {135},
  number       = {1},
  pages        = {367--387},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11277-024-11021-6},
  doi          = {10.1007/S11277-024-11021-6},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/SrivastavaPA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LaghariMAAK23,
  author       = {Sham{-}ul{-}Arfeen Laghari and
                  Selvakumar Manickam and
                  Ayman Khallel Ibrahim Al{-}Ani and
                  Mahmood A. Al{-}Shareeda and
                  Shankar Karuppayah},
  title        = {{ES-SECS/GEM:} An Efficient Security Mechanism for {SECS/GEM} Communications},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {31813--31828},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3262310},
  doi          = {10.1109/ACCESS.2023.3262310},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LaghariMAAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/WangHYLL23,
  author       = {Yuhang Wang and
                  Ying He and
                  F. Richard Yu and
                  Qiuzhen Lin and
                  Victor C. M. Leung},
  title        = {Efficient Resource Allocation in Multi-UAV Assisted Vehicular Networks
                  With Security Constraint and Attention Mechanism},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {22},
  number       = {7},
  pages        = {4802--4813},
  year         = {2023},
  url          = {https://doi.org/10.1109/TWC.2022.3229013},
  doi          = {10.1109/TWC.2022.3229013},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/WangHYLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/SpinaR23,
  author       = {Mattia Giovanni Spina and
                  Floriano De Rango},
  title        = {Lightweight, Dynamic and Energy Efficient Security Mechanism for constrained
                  IoT devices using CoAP},
  booktitle    = {20th {IEEE} Consumer Communications {\&} Networking Conference,
                  {CCNC} 2023, Las Vegas, NV, USA, January 8-11, 2023},
  pages        = {1123--1128},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CCNC51644.2023.10059854},
  doi          = {10.1109/CCNC51644.2023.10059854},
  timestamp    = {Tue, 21 Mar 2023 13:49:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/SpinaR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Alqahtani20,
  author       = {Abdulrahman Saad Alqahtani},
  title        = {Security threats and countermeasures in software defined network using
                  efficient and secure trusted routing mechanism},
  journal      = {Comput. Commun.},
  volume       = {153},
  pages        = {336--341},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.02.020},
  doi          = {10.1016/J.COMCOM.2020.02.020},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/Alqahtani20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/RoutSPSD20,
  author       = {Sidhartha Sankar Rout and
                  Akshat Singh and
                  Suyog Bhimrao Patil and
                  Mitali Sinha and
                  Sujay Deb},
  title        = {Security Threats in Channel Access Mechanism of Wireless NoC and Efficient
                  Countermeasures},
  booktitle    = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2020,
                  Sevilla, Spain, October 10-21, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISCAS45731.2020.9180581},
  doi          = {10.1109/ISCAS45731.2020.9180581},
  timestamp    = {Mon, 18 Jan 2021 08:38:59 +0100},
  biburl       = {https://dblp.org/rec/conf/iscas/RoutSPSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dga/FarhadiTTG19,
  author       = {Farzaneh Farhadi and
                  Hamidreza Tavafoghi and
                  Demosthenis Teneketzis and
                  S. Jamaloddin Golestani},
  title        = {An Efficient Dynamic Allocation Mechanism for Security in Networks
                  of Interdependent Strategic Agents},
  journal      = {Dyn. Games Appl.},
  volume       = {9},
  number       = {4},
  pages        = {914--941},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13235-018-0284-4},
  doi          = {10.1007/S13235-018-0284-4},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dga/FarhadiTTG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/VatchalaRS19,
  author       = {S. Vatchala and
                  S. Ravimaran and
                  A. Sathish},
  title        = {Auto Sec {SDN-XTR:} {A} Hybrid End to End Security Mechanism with
                  Efficient Trace Representation on Open Stack Cloud},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {35},
  number       = {3},
  pages        = {697--718},
  year         = {2019},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=168\_2245},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/VatchalaRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai2/VladutaBP19,
  author       = {Valentin{-}Alexandru Vladuta and
                  Ion Bica and
                  Victor Valeriu Patriciu},
  title        = {Energy Efficient Trust-Based Security Mechanism for Wireless Sensors
                  and Unmanned Aerial Vehicles},
  booktitle    = {11th International Conference on Electronics, Computers and Artificial
                  Intelligence, {ECAI} 2019, Pitesti, Romania, June 27-29, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ECAI46879.2019.9041986},
  doi          = {10.1109/ECAI46879.2019.9041986},
  timestamp    = {Tue, 05 Apr 2022 15:53:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai2/VladutaBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Yitbarek18,
  author       = {Salessawi Ferede Yitbarek},
  title        = {Hardware Mechanisms for Efficient Memory System Security},
  school       = {University of Michigan, {USA}},
  year         = {2018},
  url          = {https://hdl.handle.net/2027.42/147604},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Yitbarek18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/BansalNG18,
  author       = {Ritesh Bansal and
                  Chander Kumar Nagpal and
                  Shailender Gupta},
  title        = {An efficient hybrid security mechanism based on chaos and improved
                  {BPCS}},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {6},
  pages        = {6799--6835},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4600-6},
  doi          = {10.1007/S11042-017-4600-6},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/BansalNG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wac2/YazdandoostKKS18,
  author       = {Ali Yazdandoost and
                  Peyman Khazaei and
                  Rahim Kamali and
                  Salar Saadatian},
  title        = {An Efficient Scheduling for Security Constraint Unit Commitment Problem
                  Via Modified Genetic Algorithm Based on Multicellular Organisms Mechanisms},
  booktitle    = {2018 World Automation Congress, {WAC} 2018, Stevenson, WA, USA, June
                  3-6, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/WAC.2018.8430391},
  doi          = {10.23919/WAC.2018.8430391},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/wac2/YazdandoostKKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-07915,
  author       = {Ali Yazdandoost and
                  Peyman Khazaei and
                  Rahim Kamali and
                  Salar Saadatian},
  title        = {An Efficient Scheduling for Security Constraint Unit Commitment Problem
                  Via Modified Genetic Algorithm Based on Multicellular Organisms Mechanisms},
  journal      = {CoRR},
  volume       = {abs/1806.07915},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.07915},
  eprinttype    = {arXiv},
  eprint       = {1806.07915},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-07915.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/HellaouiKB17,
  author       = {Hamed Hellaoui and
                  Mouloud Koudil and
                  Abdelmadjid Bouabdallah},
  title        = {Energy-efficient mechanisms in security of the internet of things:
                  {A} survey},
  journal      = {Comput. Networks},
  volume       = {127},
  pages        = {173--189},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comnet.2017.08.006},
  doi          = {10.1016/J.COMNET.2017.08.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/HellaouiKB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/ArshadNAN17,
  author       = {Hamed Arshad and
                  Morteza Nikooghadam and
                  Sara Avezverdi and
                  Mahboubeh Nazari},
  title        = {Design and {FPGA} implementation of an efficient security mechanism
                  for mobile pay-TV systems},
  journal      = {Int. J. Commun. Syst.},
  volume       = {30},
  number       = {15},
  year         = {2017},
  url          = {https://doi.org/10.1002/dac.3305},
  doi          = {10.1002/DAC.3305},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/ArshadNAN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/PuthalNRC17,
  author       = {Deepak Puthal and
                  Surya Nepal and
                  Rajiv Ranjan and
                  Jinjun Chen},
  title        = {A dynamic prime number based efficient security mechanism for big
                  sensing data streams},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {83},
  number       = {1},
  pages        = {22--42},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jcss.2016.02.005},
  doi          = {10.1016/J.JCSS.2016.02.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/PuthalNRC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HanataniHMY16,
  author       = {Yoshikazu Hanatani and
                  Goichiro Hanaoka and
                  Takahiro Matsuda and
                  Takashi Yamakawa},
  title        = {Efficient key encapsulation mechanisms with tight security reductions
                  to standard assumptions in the two security models},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {12},
  pages        = {1676--1697},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1444},
  doi          = {10.1002/SEC.1444},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HanataniHMY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictcsdm/VinodV16,
  author       = {D. Franklin Vinod and
                  V. Vasudevan},
  editor       = {S. Arumugam and
                  Jay S. Bagga and
                  Lowell W. Beineke and
                  B. S. Panda},
  title        = {A Bi-level Security Mechanism for Efficient Protection on Graphs in
                  Online Social Network},
  booktitle    = {Theoretical Computer Science and Discrete Mathematics - First International
                  Conference, {ICTCSDM} 2016, Krishnankoil, India, December 19-21, 2016,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10398},
  pages        = {69--75},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-64419-6\_9},
  doi          = {10.1007/978-3-319-64419-6\_9},
  timestamp    = {Fri, 11 Jun 2021 08:27:11 +0200},
  biburl       = {https://dblp.org/rec/conf/ictcsdm/VinodV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wuwnet/IbragimovLKNPYK14,
  author       = {Mukhridinkhon Ibragimov and
                  Jae{-}Hoon Lee and
                  Muppalla Kalyani and
                  Jung{-}Il Namgung and
                  Soo{-}Hyun Park and
                  Ok Yeon Yi and
                  Changhwa Kim},
  editor       = {Chiara Petrioli and
                  Tommaso Melodia and
                  Fumin Zhang and
                  Zhengdao Wang and
                  Jo{\~{a}}o Gomes and
                  Wencen Wu},
  title        = {An Energy efficient {CCM-UW} security mechanism for Underwater Acoustic
                  Networks},
  booktitle    = {Proceedings of the International Conference on Underwater Networks
                  {\&} Systems, Rome, Italy, November 12 - 14, 2014},
  pages        = {41:1--41:2},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2671490.2674578},
  doi          = {10.1145/2671490.2674578},
  timestamp    = {Wed, 25 Mar 2020 13:28:30 +0100},
  biburl       = {https://dblp.org/rec/conf/wuwnet/IbragimovLKNPYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/AliK13,
  author       = {Aftab Ali and
                  Farrukh Aslam Khan},
  title        = {Energy-efficient cluster-based security mechanism for intra-WBAN and
                  inter-WBAN communications for healthcare applications},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2013},
  pages        = {216},
  year         = {2013},
  url          = {https://doi.org/10.1186/1687-1499-2013-216},
  doi          = {10.1186/1687-1499-2013-216},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/AliK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcac/BenkhelifaFW13,
  author       = {Elhadj Benkhelifa and
                  Dayan Abishek Fernando and
                  Thomas Welsh},
  title        = {A Novel Cloud-Based Multi-Tenancy Architecture with Efficient Hybrid
                  Authentication Mechanism for Enhanced Security and Resource Optimization},
  journal      = {Int. J. Cloud Appl. Comput.},
  volume       = {3},
  number       = {3},
  pages        = {34--49},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijcac.2013070103},
  doi          = {10.4018/IJCAC.2013070103},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcac/BenkhelifaFW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Schlake12,
  author       = {Fari Schlake},
  title        = {Optimal Consumer-Centric Delay-Efficient Security Management in Multi-Agent
                  Networks: {A} Game and Mechanism Design Theoretic Approach},
  school       = {Virginia Tech, Blacksburg, VA, {USA}},
  year         = {2012},
  url          = {http://hdl.handle.net/10919/77362},
  timestamp    = {Tue, 23 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Schlake12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/Sahoo12,
  author       = {Prasan Kumar Sahoo},
  title        = {Efficient Security Mechanisms for mHealth Applications Using Wireless
                  Body Sensor Networks},
  journal      = {Sensors},
  volume       = {12},
  number       = {9},
  pages        = {12606--12633},
  year         = {2012},
  url          = {https://doi.org/10.3390/s120912606},
  doi          = {10.3390/S120912606},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/Sahoo12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndt/BoubicheBA12,
  author       = {Djallel Eddine Boubiche and
                  Azeddine Bilami and
                  Samir Athmani},
  editor       = {Rachid Benlamri},
  title        = {A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep
                  Attacks on Wireless Sensor Network},
  booktitle    = {Networked Digital Technologies - 4th International Conference, {NDT}
                  2012, Dubai, UAE, April 24-26, 2012, Proceedings, Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {294},
  pages        = {151--164},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30567-2\_13},
  doi          = {10.1007/978-3-642-30567-2\_13},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndt/BoubicheBA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-0380,
  title        = {An Efficient Security Mechanism for High-Integrity Wireless Sensor
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1111.0380},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://arxiv.org/abs/1111.0380},
  eprinttype    = {arXiv},
  eprint       = {1111.0380},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1111-0380.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/baip/RuckmaniS10,
  author       = {V. Ruckmani and
                  G. Sudha Sadasivam},
  editor       = {Vinu V. Das and
                  R. Vijayakumar and
                  Narayan C. Debnath and
                  Janahanlal Stephen and
                  Natarajan Meghanathan and
                  Suresh Sankaranarayanan and
                  P. M. Thankachan and
                  Ford Lumban Gaol and
                  Nessy Thankachan},
  title        = {Integrating an Efficient Authorization Protocol with Trigon-Based
                  Authentication Mechanism for Improving Grid Security},
  booktitle    = {Information Processing and Management - International Conference on
                  Recent Trends in Business Administration and Information Processing,
                  {BAIP} 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {70},
  pages        = {125--129},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12214-9\_22},
  doi          = {10.1007/978-3-642-12214-9\_22},
  timestamp    = {Thu, 01 Jun 2017 18:59:02 +0200},
  biburl       = {https://dblp.org/rec/conf/baip/RuckmaniS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/SawazakiMY10,
  author       = {Junya Sawazaki and
                  Toshiyuki Maeda and
                  Akinori Yonezawa},
  editor       = {Yutaka Ishikawa and
                  Dong Tang and
                  Hiroshi Nakamura},
  title        = {Implementing a Hybrid Virtual Machine Monitor for Flexible and Efficient
                  Security Mechanisms},
  booktitle    = {16th {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2010, Tokyo, Japan, December 13-15, 2010},
  pages        = {37--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/PRDC.2010.32},
  doi          = {10.1109/PRDC.2010.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prdc/SawazakiMY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-2516,
  author       = {Jaydip Sen},
  title        = {An Efficient Security Mechanism for High-Integrity Wireless Sensor
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1012.2516},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.2516},
  eprinttype    = {arXiv},
  eprint       = {1012.2516},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-2516.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/HussainKMP09,
  author       = {Sajid Hussain and
                  Firdous Kausar and
                  Ashraf Masood and
                  Jong Hyuk Park},
  title        = {An efficient collusion resistant security mechanism for heterogeneous
                  sensor networks},
  journal      = {Internet Res.},
  volume       = {19},
  number       = {2},
  pages        = {227--245},
  year         = {2009},
  url          = {https://doi.org/10.1108/10662240910952364},
  doi          = {10.1108/10662240910952364},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/HussainKMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/LeePRG09,
  author       = {Li{-}Te Lee and
                  Yu{-}Ting Pai and
                  Shanq{-}Jang Ruan and
                  J{\"{u}}rgen G{\"{o}}tze},
  title        = {An energy efficient and high securitywatermarking mechanism based
                  on {DS-CDMA}},
  booktitle    = {Proceedings of the 2009 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2009, June 28 - July 2, 2009, New York City, NY,
                  {USA}},
  pages        = {1190--1193},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICME.2009.5202713},
  doi          = {10.1109/ICME.2009.5202713},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/LeePRG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/YanO09,
  author       = {Gongjun Yan and
                  Stephan Olariu},
  title        = {An Efficient Geographic Location-based Security Mechanism for Vehicular
                  Adhoc Networks},
  booktitle    = {{IEEE} 6th International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2009, 12-15 October 2009, Macau (S.A.R.), China},
  pages        = {804--809},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MOBHOC.2009.5336914},
  doi          = {10.1109/MOBHOC.2009.5336914},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/YanO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChenWHC08,
  author       = {Chi{-}Yuan Chen and
                  Tin Yu Wu and
                  Yueh{-}Min Huang and
                  Han{-}Chieh Chao},
  title        = {An efficient end-to-end security mechanism for {IP} multimedia subsystem},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {18},
  pages        = {4259--4268},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2008.05.025},
  doi          = {10.1016/J.COMCOM.2008.05.025},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ChenWHC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhuYLSJ07,
  author       = {Sencun Zhu and
                  Chao Yao and
                  Donggang Liu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {Efficient security mechanisms for overlay multicast based content
                  delivery},
  journal      = {Comput. Commun.},
  volume       = {30},
  number       = {4},
  pages        = {793--806},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comcom.2006.10.003},
  doi          = {10.1016/J.COMCOM.2006.10.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhuYLSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/TraynorKCCZP07,
  author       = {Patrick Traynor and
                  Raju Kumar and
                  Heesook Choi and
                  Guohong Cao and
                  Sencun Zhu and
                  Thomas La Porta},
  title        = {Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {6},
  number       = {6},
  pages        = {663--677},
  year         = {2007},
  url          = {https://doi.org/10.1109/TMC.2007.1020},
  doi          = {10.1109/TMC.2007.1020},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/TraynorKCCZP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/ZhuSJ06,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {{LEAP+:} Efficient security mechanisms for large-scale distributed
                  sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {2},
  number       = {4},
  pages        = {500--528},
  year         = {2006},
  url          = {https://doi.org/10.1145/1218556.1218559},
  doi          = {10.1145/1218556.1218559},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosn/ZhuSJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/TraynorKSCP06,
  author       = {Patrick Traynor and
                  Raju Kumar and
                  Hussain Bin Saad and
                  Guohong Cao and
                  Thomas La Porta},
  editor       = {Per Gunningberg and
                  Lars{-}{\AA}ke Larzon and
                  Mahadev Satyanarayanan and
                  Nigel Davies},
  title        = {{LIGER:} implementing efficient hybrid security mechanisms for heterogeneous
                  sensor networks},
  booktitle    = {Proceedings of the 4th International Conference on Mobile Systems,
                  Applications, and Services (MobiSys 2006), Uppsala, Sweden, June 19-22,
                  2006},
  pages        = {15--27},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1134680.1134683},
  doi          = {10.1145/1134680.1134683},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/TraynorKSCP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhuYLSJ05,
  author       = {Sencun Zhu and
                  Chao Yao and
                  Donggang Liu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Efficient Security Mechanisms for Overlay Multicast-Based Content
                  Distribution},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {40--55},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_4},
  doi          = {10.1007/11496137\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ZhuYLSJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/HuhLMC05,
  author       = {Eui{-}nam Huh and
                  Seung{-}Yeon Lee and
                  Youngsong Mun and
                  Hyunseung Choo},
  editor       = {Hamid R. Arabnia},
  title        = {An Efficient Authentication Mechanism on Ad-Hoc Telematics Environment},
  booktitle    = {Proceedings of The 2005 International Conference on Security and Management,
                  {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005},
  pages        = {348--356},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Wed, 06 Dec 2006 10:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/HuhLMC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icita/SahooCS05,
  author       = {Prasan Kumar Sahoo and
                  Jonathan Jen{-}Rong Chen and
                  Ping{-}Tai Sun},
  title        = {Efficient Security Mechanisms for the Distributed Wireless Sensor
                  Networks},
  booktitle    = {Third International Conference on Information Technology and Applications
                  {(ICITA} 2005), 4-7 July 2005, Sydney, Australia},
  pages        = {541--546},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICITA.2005.124},
  doi          = {10.1109/ICITA.2005.124},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icita/SahooCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skg/DaiCZX05,
  author       = {Honglei Dai and
                  Shuoying Chen and
                  Li Zha and
                  Zhiwei Xu},
  title        = {Efficient and Loosely Coupled Security Mechanism in Vega Grid},
  booktitle    = {2005 International Conference on Semantics, Knowledge and Grid {(SKG}
                  2005), 27-29 November 2005, Beijing, China},
  pages        = {76},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SKG.2005.69},
  doi          = {10.1109/SKG.2005.69},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skg/DaiCZX05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/Dressler05,
  author       = {Falko Dressler},
  editor       = {Matthias Bossardt and
                  Georg Carle and
                  David Hutchison and
                  Hermann de Meer and
                  Bernhard Plattner},
  title        = {Bio-inspired mechanisms for efficient and adaptive network security
                  mechanisms},
  booktitle    = {Service Management and Self-Organization in IP-based Networks},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {04411},
  publisher    = {IBFI, Schloss Dagstuhl, Germany},
  year         = {2005},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2005/87},
  timestamp    = {Mon, 26 Sep 2022 16:14:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/Dressler05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuSJ03,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {{LEAP:} efficient security mechanisms for large-scale distributed
                  sensor networks},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {62--72},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948120},
  doi          = {10.1145/948109.948120},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HuPJ03,
  author       = {Yih{-}Chun Hu and
                  Adrian Perrig and
                  David B. Johnson},
  title        = {Efficient Security Mechanisms for Routing Protocolsa},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2003, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2003},
  url          = {https://www.ndss-symposium.org/ndss2003/efficient-security-mechanisms-for-routing-protocols/},
  timestamp    = {Mon, 01 Feb 2021 08:42:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HuPJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/ZhuSJ03,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {Ian F. Akyildiz and
                  Deborah Estrin and
                  David E. Culler and
                  Mani B. Srivastava},
  title        = {{LEAP} - efficient security mechanisms for large-scale distributed
                  sensor networks},
  booktitle    = {Proceedings of the 1st International Conference on Embedded Networked
                  Sensor Systems, SenSys 2003, Los Angeles, California, USA, November
                  5-7, 2003},
  pages        = {308--309},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/958491.958534},
  doi          = {10.1145/958491.958534},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/ZhuSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SmithG98,
  author       = {Bradley R. Smith and
                  J. J. Garcia{-}Luna{-}Aceves},
  title        = {Efficient security mechanisms for the border gateway routing protocol},
  journal      = {Comput. Commun.},
  volume       = {21},
  number       = {3},
  pages        = {203--210},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0140-3664(97)00186-2},
  doi          = {10.1016/S0140-3664(97)00186-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/SmithG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}