Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,237,304 papers from all fields of science
Search
Sign In
Create Free Account
Security service (telecommunication)
Known as:
Security Service
, X.800
Security service is a service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
Abstraction layer
Access control
Attack (computing)
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things
Xiong Li
,
Jieyao Peng
,
J. Niu
,
Fan Wu
,
Junguo Liao
,
Kim-Kwang Raymond Choo
IEEE Internet of Things Journal
2018
Corpus ID: 49186622
The Internet of Things (IoT) is an emerging technology and expected to provide solutions for various industrial fields. As a…
Expand
Highly Cited
2015
Highly Cited
2015
ACPN: A Novel Authentication Framework with Conditional Privacy-Preservation and Non-Repudiation for VANETs
Jie Li
,
Huang Lu
,
M. Guizani
IEEE Transactions on Parallel and Distributed…
2015
Corpus ID: 16535631
In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside…
Expand
Highly Cited
2011
Highly Cited
2011
Multi-level Intrusion Detection System and log management in Cloud Computing
Jun-Ho Lee
,
Min-Woo Park
,
Jung-Ho Eom
,
Tai M. Chung
International Conference on Advanced…
2011
Corpus ID: 37778967
Cloud Computing is a new type of service which provides large scale computing resource to each customer. Cloud Computing systems…
Expand
Highly Cited
2008
Highly Cited
2008
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
P. Ning
,
An Liu
,
Wenliang Du
TOSN
2008
Corpus ID: 14333050
Broadcast authentication is a critical security service in wireless sensor networks. There are two general approaches for…
Expand
Highly Cited
2007
Highly Cited
2007
Multi-user Broadcast Authentication in Wireless Sensor Networks
K. Ren
,
Shucheng Yu
,
Wenjing Lou
,
Yanchao Zhang
Annual IEEE Communications Society Conference on…
2007
Corpus ID: 10600966
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows the mobile users of WSNs…
Expand
Highly Cited
2006
Highly Cited
2006
On Broadcast Authentication in Wireless Sensor Networks
K. Ren
,
Wenjing Lou
,
K. Zeng
,
P. Moran
IEEE Transactions on Wireless Communications
2006
Corpus ID: 15446041
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), since it enables users to broadcast…
Expand
Highly Cited
2005
Highly Cited
2005
Establishing pairwise keys in distributed sensor networks
Donggang Liu
,
P. Ning
,
Rongfang Li
TSEC
2005
Corpus ID: 53235721
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely…
Expand
Highly Cited
2005
Highly Cited
2005
Improving key predistribution with deployment knowledge in static sensor networks
Donggang Liu
,
P. Ning
TOSN
2005
Corpus ID: 11214925
Pairwise key establishment is a fundamental security service for sensor networks. However, establishing pairwise keys in sensor…
Expand
Highly Cited
2004
Highly Cited
2004
Multilevel μTESLA: Broadcast authentication for distributed sensor networks
Donggang Liu
,
P. Ning
TECS
2004
Corpus ID: 6979433
Broadcast authentication is a fundamental security service in distributed sensor networks. This paper presents the development of…
Expand
Highly Cited
2004
Highly Cited
2004
Policy-based network management
Abdur Rahim Choudhary
Bell Labs technical journal
2004
Corpus ID: 25255173
Depending on the context, a policy can be a paper document, a table for selecting options, a sequence of logical assertions to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE