-
1by Fei Yu, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang, Jose Maria de FuentesGet full text
Published 2015-01-01
Article -
2by Fei Yu, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang, Jose Maria de FuentesGet full text
Published 2017-01-01
Article -
3“..., easily at home. However, there are a lot of security and privacy issues arise while enjoying...”
Get full text
Others -
4“... and mobile networks. Both Internet and mobile networks are public; the transactions security and information...”
Get full text
Others -
5“..., the traditional applications of wired networks have been transmitted to wireless networks. A part of research...”
Get full text
Others -
6“...) Secure communications for ad hoc networks, (3) Electronic commerce, and (4) Oblivious transfer protocol...”
Get full text
Others -
7“... of global mobility network. This protocol is based on the concept of distributed security management, i.e...”
Get full text
Others -
8“... the diversification of network services is not impractical. Generally, providing secure network services needs two...”
Get full text
Others -
9by Shanshan Tu, Muhammad Waqas, Sadaqat Ur Rehman, Muhammad Aamir, Obaid Ur Rehman, Zhang Jianbiao, Chin-Chen ChangSubjects: “...physical layer security...”
Published 2018-01-01
Get full text
Article -
10by Jianjun Li, Jie Yu, Lanlan Xu, Xinying Xue, Chin-Chen Chang, Xiaoyang Mao, Junfeng Hu“...Security and Communication Networks...”
Published 2018-01-01
Get full text
Article -
11“..., for secure communications in the vehicular ad hoc networks (VANET), Li et al. proposed a secure model...”
Get full text
Others -
12“.... The security of the proposed scheme is based on the public one-way hash function. Furthermore, the novel...”
Get full text
Others -
13
-
14
-
15
-
16
-
17
-
18by Dinh-Chien Nguyen, Thai-Son Nguyen, Chin-Chen Chang, Huan-Sheng Hsueh, Fang-Rong Hsu“...Security and Communication Networks...”
Published 2018-01-01
Get full text
Article -
19
-
20