Search
Now showing items 1-10 of 15
Security and privacy in emerging networks: Part 1 [Guest Editorial]
(
IEEE
, 2015 , Article)
With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these ...
An Accountable, Privacy-Preserving, and Efficient Authentication Framework for Wireless Access Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Article)
The convergence of wireless access networks significantly changes the way we live and work, bringing us closer to the goal of computing anywhere at any time. Security, privacy, accountability, and efficiency issues are of ...
Security Analysis of a Space-Based Wireless Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
With the gradual deployment of the spacebased wireless network, security risks in the data communication between satellites and even the internal structure of a satellite become extremely important. In this article, we use ...
How Does Social Behavior Affect Your Password?
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
A password is an important method of identity authentication, so there are endless research attempts on passwords, but most of them are based on different languages and technologies. As far as we know, no one has studied ...
Offloading Time Optimization via Markov Decision Process in Mobile-Edge Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Computation offloading from a mobile device to the edge server is an emerging paradigm to reduce completion latency of intensive computations in mobile-edge computing (MEC). In order to satisfy the delay-sensitive computing ...
Mobile application security: Malware threats and defenses
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for ...
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks
(2013 , Article)
Wireless sensor networks (WSNs) are widely applicable in monitoring and control of environment parameters. It is sometimes necessary to disseminate data through wireless links after they are deployed in order to adjust ...
Secure service provision in smart grid communications
(2012 , Article)
The smart grid provides a platform for thirdparty service providers to remotely monitor and manage energy usage for consumers. At the same time, the involvement of service providers brings a new set of security threats to ...
Security and privacy in emerging networks: Part II [Guest Editorial]
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article Review)
This is the second part of the " Security and Privacy in Emerging Networks" Feature Topic. In Part I, which was published in April 2015, we selected those contributions that dealt with the theory behind the security and ...
Handover authentication for mobile networks: Security and efficiency aspects
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
A handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task ...