Search Results

There are 118796 results for: content related to: Single authentication through in convergence space using collaborative smart cameras

  1. Security analysis of SM2 key exchange protocol in TPM2.0

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 383–395, Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin and Dengguo Feng

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.987

  2. Yet another attack on the chinese remainder theorem-based hierarchical access control scheme

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1079–1095, Niu Liu, Shaohua Tang and Lingling Xu

    Version of Record online : 5 JUL 2013, DOI: 10.1002/sec.837

  3. Detecting stepping stones by abnormal causality probability

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1831–1844, Sheng Wen, Di Wu, Ping Li, Yang Xiang, Wanlei Zhou and Guiyi Wei

    Version of Record online : 23 JUN 2014, DOI: 10.1002/sec.1037

  4. Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 740–750, Joonsang Baek, Young-ji Byon, Eman Hableel and Mahmoud Al-Qutayri

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1021

  5. Reliability enhancement for CIR-based physical layer authentication

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 661–671, Jiazi Liu, Ahmed Refaey, Xianbin Wang and Helen Tang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1014

  6. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1036

  7. An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 245–260, Lili Xu and Fan Wu

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.977

  8. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1698–1716, Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827

  9. n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 550–564, Zhengan Huang, Shengli Liu and Kefei Chen

    Version of Record online : 4 APR 2014, DOI: 10.1002/sec.1002

  10. On cross-correlation properties of S-boxes and their design using semi-bent functions

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 790–800, Enes Pasalic, Samed Bajrić and Milan Djordjević

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1035

  11. Privacy-assured substructure similarity query over encrypted graph-structured data in cloud

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1933–1944, Yingguang Zhang, Sen Su, Yulong Wang, Weifeng Chen and Fangchun Yang

    Version of Record online : 18 NOV 2013, DOI: 10.1002/sec.907

  12. Mechanisms to locate noncooperative transmitters in wireless networks based on residual signal strengths

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1788–1804, Éric Barthélémy and Jean-Marc Robert

    Version of Record online : 24 OCT 2013, DOI: 10.1002/sec.877

  13. Optimal multiuser spread-spectrum data hiding in digital images

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 540–549, Lili Wei, Dimitris A. Pados, Stella N. Batalama, Rose Qingyang Hu and Michael J. Medley

    Version of Record online : 22 NOV 2014, DOI: 10.1002/sec.1001

  14. A nonmonotonic modal authorization logic for pervasive computing

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1077–1091, Ali Noorollahi and Mehran S. Fallah

    Version of Record online : 8 JUL 2014, DOI: 10.1002/sec.1063

  15. A new efficient signcryption scheme in the standard model

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 778–789, Zheng Yang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1034

  16. Attribute-based signature for threshold predicates from lattices

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 811–821, Qingbin Wang and Shaozhen Chen

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1038

  17. An integrated detection system against false data injection attacks in the Smart Grid

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 91–109, Wei Yu, David Griffith, Linqiang Ge, Sulabh Bhattarai and Nada Golmie

    Version of Record online : 4 MAR 2014, DOI: 10.1002/sec.957

  18. Large universe decentralized key-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 501–509, Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong and Ximeng Liu

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.997

  19. Distributed access control with adaptive privacy preserving property for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 759–773, Changsha Ma, Kaiping Xue and Peilin Hong

    Version of Record online : 30 APR 2013, DOI: 10.1002/sec.777

  20. Trust dynamic task allocation algorithm with Nash equilibrium for heterogeneous wireless sensor network

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1865–1877, Wen Zhong Guo, Jia Ye Chen, Guo Long Chen and Hai Feng Zheng

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1026