Identity-based security

Known as: Identity Based Security 
Identity-based security is a patented network security approach, put forward by Cyberoam which includes security components that provides visibility… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1998-2016
012319982016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Current telecommunications systems have very good security architectures that include authentication and authorization as well as… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
In wireless sensor networks (WSNs), massive amounts of nodes, volatile network topology and limited resources (such as energy… (More)
  • figure 1
  • figure 2
  • table I
Is this relevant?
2014
2014
In this paper, a big data driven, cloud based information and communication technology (ICT) framework for smart grid is proposed… (More)
  • figure 1
  • table I
  • figure 2
  • table II
  • figure 3
Is this relevant?
2013
2013
Cooperative Intelligent Transport Systems (ITS) based on vehicular car to car ad-hoc networks have been extensively investigated… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Vehicular ad hoc network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking… (More)
  • figure 2
  • figure 1
  • figure 3
Is this relevant?
2010
2010
This paper presents a novel security infrastructure for deploying and using service-oriented Cloud applications securely without… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2010
2010
According to P2P VoIP signaling protocol security and its distributed features, an authenticated key agreement scheme is proposed… (More)
  • figure I
  • figure 2
Is this relevant?
2007
2007
  • Guangsong Li
  • 2007 IFIP International Conference on Network and…
  • 2007
Wireless mesh networks (WMNs) are an emerging technology for last-mile broadband Internet access. This new and promising paradigm… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We present a security framework for Vehicular Ad hoc Networks (VANETs), using identity-based cryptography, to provide… (More)
Is this relevant?
2004
2004
As various applications of wireless ad hoc network have been proposed, security has received increasing attentions as one of the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?