Skip to search formSkip to main contentSkip to account menu

Identity-based security

Known as: Identity Based Security 
Identity-based security is a patented network security approach, put forward by Cyberoam which includes security components that provides visibility… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Communication security in Cluster-Based Wireless Sensor Network (CWSN) is considered as a challenging task facing this type of… 
Review
2019
Review
2019
 Abstract: A privacy-preserving public auditing mechanism is used in the cloud for data sharing in the cloud storage. To utilize… 
2018
2018
There has been a rapid growth in the number of vehicles on road, and this makes it vital to establish communication between the… 
Review
2015
Review
2015
In smart grid, Advanced Metering Infrastructure (AMI) system provides measuring, storing, analyzing, and utilizing energy… 
2014
2014
In wireless sensor networks (WSNs), massive amounts of nodes, volatile network topology and limited resources (such as energy… 
2014
2014
The biggest challenge in the field of networking is the secured communication between the nodes within the network system… 
2013
2013
Cooperative Intelligent Transport Systems (ITS) based on vehicular car to car ad-hoc networks have been extensively investigated… 
2010
2010
According to P2P VoIP signaling protocol security and its distributed features, an authenticated key agreement scheme is proposed… 
2008
2008
Provider-provisioned virtual private networks are nowadays well-established networking concepts. They are envisaged as an… 
2003
2003
  • E. Rissanen
  • 2003
  • Corpus ID: 14415631
Delegent is an authorisation server developed to provide a single centralised policy repository for multiple applications with…