Computation and Transmission Rate Based Algorithm for Reducing the Total Power Consumption
Guest Editorial: Advances in Applied Security
Guest Editorial: Addressing Insider Threats and Information Leakage
Guest Editorial: Emerging Security Technologies and Applications
Efficient and Low-Cost RFID Authentication Schemes
Insiders and Insider Threats An Overview of Definitions and Mitigation Techniques
Context-Aware Mobility Management in Heterogeneous Network Environments
Enhancing SVO Logic for Mobile IPv6 Security Protocols
Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity