Search Results

There are 3260 results for: content related to: Efficient techniques of key management and quantum cryptography in RFID networks

  1. A comprehensive analysis for fair probability marking based traceback approach in WSNs

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2448–2475, Anfeng Liu, Xiao Liu and Yuxin Liu

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1515

  2. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2507–2523, Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Version of Record online : 23 JAN 2015, DOI: 10.1002/sec.1192

  3. Dynamic spectrum access-based cryptosystem for cognitive radio networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4151–4165, Chao Zou and Chunxiao (Tricia) Chigan

    Version of Record online : 22 AUG 2016, DOI: 10.1002/sec.1595

  4. Elliptic-curve scalar multiplication algorithm using ZOT structure

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1141–1154, Hani Almimi, Azman Samsudin and Shahram Jahani

    Version of Record online : 15 JUN 2014, DOI: 10.1002/sec.1047

  5. A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1384–1397, Zuowen Tan

    Version of Record online : 2 FEB 2016, DOI: 10.1002/sec.1424

  6. Balanced double subset difference broadcast encryption scheme

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1447–1460, Shyh-Yih Wang, Wu-Chuan Yang and Ying-Jen Lin

    Version of Record online : 5 AUG 2014, DOI: 10.1002/sec.1093

  7. A two-factor authentication scheme with anonymity for multi-server environments

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1608–1625, Chi-Tung Chen and Cheng-Chi Lee

    Version of Record online : 5 SEP 2014, DOI: 10.1002/sec.1109

  8. Efficient and fault-diagnosable authentication architecture for AMI in smart grid

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 598–616, Depeng Li, Zeyar Aung, John R. Williams and Abel Sanchez

    Version of Record online : 4 APR 2014, DOI: 10.1002/sec.1006

  9. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1378–1407, Rajeev Singh and Teek Parval Sharma

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1079

  10. Home area network accountability with varying consumption devices in smart grid

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 977–995, Eric McCary and Yang Xiao

    Version of Record online : 9 DEC 2015, DOI: 10.1002/sec.1393

  11. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Version of Record online : 19 JUN 2012, DOI: 10.1002/sec.542

  12. Quantum-resistance authentication in centralized cognitive radio networks

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1158–1172, Shaghayegh Bakhtiari Chehelcheshmeh and Mehdi Hosseinzadeh

    Version of Record online : 10 FEB 2016, DOI: 10.1002/sec.1408

  13. Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network

    Security and Communication Networks

    Volume 9, Issue 7, 10 May 2016, Pages: 667–679, Tzonelih Hwang and Prosanta Gope

    Version of Record online : 16 NOV 2015, DOI: 10.1002/sec.1388

  14. Matrix embedding in multicast steganography: analysis in privacy, security and immediacy

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 791–802, Weiwei Liu, Guangjie Liu and Yuewei Dai

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1168

  15. Modeling, conflict detection, and verification of a new virtualization role-based access control framework

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1904–1925, Yang Luo, Chunhe Xia, Liangshuang Lv, Zhao Wei and Yazhuo Li

    Version of Record online : 23 JUN 2014, DOI: 10.1002/sec.1025

  16. HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster–Shafer theory with MapReduce

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4341–4357, Thankaraja Raja Sree and Somasundaram Mary Saira Bhanu

    Version of Record online : 17 OCT 2016, DOI: 10.1002/sec.1611

  17. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  18. A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4650–4666, Ruhul Amin, SK Hafizul Islam, G.P. Biswas, Debasis Giri, Muhammad Khurram Khan and Neeraj Kumar

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1655

  19. Multi-proxy multi-signature binding positioning protocol

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3868–3879, Qingshui Xue, Fengying Li, Huafeng Chen, Huajun Zhang and Zhenfu Cao

    Version of Record online : 7 SEP 2016, DOI: 10.1002/sec.1581

  20. AD-ASGKA – authenticated dynamic protocols for asymmetric group key agreement

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1340–1352, Mingchu Li, Xiaodong Xu, Cheng Guo and Xing Tan

    Version of Record online : 26 JAN 2016, DOI: 10.1002/sec.1420