Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,300 papers from all fields of science
Search
Sign In
Create Free Account
Security service (telecommunication)
Known as:
Security Service
, X.800
Security service is a service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
Abstraction layer
Access control
Attack (computing)
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
To Achieve a Security Service Chain by Integration of NFV and SDN
Yeping Liu
,
Zhigang Guo
,
Guochu Shou
,
Yihong Hu
International Conference on Instrumentation and…
2016
Corpus ID: 1688389
In the last two years, ETSI's NFV Management and Orchestration working group has defined the NFV reference architecture. Network…
Expand
2013
2013
A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks
Pardeep Kumar
,
A. Gurtov
,
M. Ylianttila
,
Sanggon Lee
,
Hoon-Jae Lee
ETRI Journal
2013
Corpus ID: 62644828
Wireless sensor networks (WSNs) are used for many real‐time applications. User authentication is an important security service…
Expand
2009
2009
SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks
Wenbo He
,
Ying Huang
,
R. Sathyam
,
K. Nahrstedt
,
W. C. Lee
IEEE Transactions on Information Forensics and…
2009
Corpus ID: 180640
Mission-critical networks show great potential in emergency response and/or recovery, health care, critical infrastructure…
Expand
Review
2009
Review
2009
Recent Advances and Classification of Watermarking Techniques in Digital Images
Chunlin Song
,
S. Sudirman
,
M. Merabti
2009
Corpus ID: 55524425
This paper surveys recent advances in watermarking techniques in digital images. The aim of digital watermarking is to include…
Expand
2007
2007
Traffic Flow Confidentiality in IPsec: Protocol and Implementation
C. Király
,
S. Teofili
,
G. Bianchi
,
R. Cigno
,
Matteo Nardelli
,
Emanuele Delzeri
FIDIS
2007
Corpus ID: 3523175
Traffic Flow Confidentiality (TFC) mechanisms are techniques devised to hide/masquerade the traffic pattern to prevent…
Expand
2007
2007
Towards Trustworthy Virtualisation Environments : Xen Library OS Security Service Infrastructure
M. Anderson
,
Micha Moffie
,
Chris I. Dalton
2007
Corpus ID: 15465178
New cost effective commodity PC hardware now includes fully virtualisable processors and the Trusted Computing Group’s trusted…
Expand
2005
2005
Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis
G. Tanna
,
Manish Gupta
,
H. Rao
,
S. Upadhyaya
Decision Support Systems
2005
Corpus ID: 14237986
Highly Cited
2004
Highly Cited
2004
A mobile agent security management
Eung-Gu You
,
Keum-Suk Lee
18th International Conference on Advanced…
2004
Corpus ID: 16590820
As the proliferation of Internet, mobile agent related technologies are examined for possible growth and evaluation. In…
Expand
1999
1999
Supporting customized failure models for distributed software
M. Hiltunen
,
Vijaykumar Immanuel
,
R. Schlichting
Distributed Syst. Eng.
1999
Corpus ID: 15006157
The cost of employing software fault tolerance techniques in distributed systems is strongly related to the type of failures to…
Expand
Highly Cited
1987
Highly Cited
1987
ABYSS: ATrusted Architecture for Software Protection
Steve R. White
,
L. Comerford
IEEE Symposium on Security and Privacy
1987
Corpus ID: 11898158
ABYSS (A Basic Yorktown Security System) is an architecture for the trusted execution of application software. It supports a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE