Search

Your search keyword '"Mahdi Aiash"' showing total 55 results

Search Constraints

Start Over You searched for: Author "Mahdi Aiash" Remove constraint Author: "Mahdi Aiash" Database OpenAIRE Remove constraint Database: OpenAIRE
55 results on '"Mahdi Aiash"'

Search Results

1. An Introduction of a Modular Framework for Securing 5G Networks and Beyond

2. DCSS Protocol for Data Caching and Sharing Security in a 5G Network

3. Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems

5. Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif

6. Security in Network Services Delivery for 5G Enabled D2D Communications: Challenges and Solutions

7. Formal verification and analysis of primary authentication based on 5G-AKA protocol

8. The Case for Federated Identity Management in 5G Communications

9. Network Service Federated Identity (NS- FId) Protocol for Service Authorization in 5G Network

10. Investigating network services abstraction in 5G enabled device-to-device (D2D) communications

11. Formalization and Analysis of a Resource Allocation Security Protocol for Secure Service Migration

13. Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement

14. Software defined networking for wireless sensor networks: a survey

15. Mobility management for vehicular user equipment in LTE/mobile femtocell networks

16. A formal analysis of authentication protocols for mobile devices in next generation networks

17. Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR

18. On the Investigation of Cloud-Based Mobile Media Environments With Service-Populating and QoS-Aware Mechanisms

19. Interference management for co-channel mobile Femtocells technology in LTE networks

20. A Progressive Approach to Design Authentication Protocols for Mobile Heterogeneous Networks

21. Enhancing the SVDD Accuracy in Intrusion Detection Systems by Removing External Voids

22. A specification-based IDS for detecting attacks on RPL-based network topology

23. On preserving privacy in cloud computing using ToR

24. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach

25. A security framework for node-to-node communications based on the LISP architecture

26. U-sphere: strengthening scalable flat-name routing for decentralized networks

28. Supporting Communication in Information Centric Networks Using the Location/ID Split Protocol and Time Released Caching

29. Challenges and solutions for secure information centric networks: a case study of the NetInf architecture

30. Will ToR Achieve Its Goals in the 'Future Internet'? An Empirical Study of Using ToR with Cloud Computing

31. Introducing a Hybrid Infrastructure and Information-Centric Approach for Secure Cloud Computing

32. Investigating a Mobility-Aware QoS Model for Multimedia Streaming Rate Adaptation

33. A formally verified access control mechanism for information centric networks

34. Dynamic Traffic Management for Interactive Cloud Services: Localising Traffic Based on Network Throughput and User Mobility

35. Dynamic edge-caching for mobile users: minimising inter-AS traffic by moving cloud services and VMs

36. A Secure Framework for Communications in Heterogeneous Networks

37. Investigating the Impact of Live Migration on the Network Infrastructure in Enterprise Environments

38. Secure Live Virtual Machines Migration: Issues and Solutions

39. Exploring a New Security Framework for Cloud Storage Using Capabilities

40. Supporting communications in the IoTs using the location/ID split protocol: A security analysis

41. Security analysis of the constrained application protocol in the Internet of Things

42. From fixed to mobile femtocells in LTE systems: Issues and challenges

43. A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR

44. Securing Address Registration in Location/ID Split Protocol Using ID-Based Cryptography

45. M-Sieve: A visualisation tool for supporting network security analysts: VAST 2012 Mini Challenge 1 award: 'Subject matter expert's award'

46. A SURVEY ON AUTHENTICATION AND KEY AGREEMENT PROTOCOLS IN HETEROGENEOUS NETWORKS

47. Integrating Mobility, Quality-of-service and Security in Future Mobile Networks

48. A survey of potential architectures for communication in heterogeneous networks

49. Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments

50. A formally verified device authentication protocol using Casper/FDR

Catalog

Books, media, physical & digital resources