Search Results

There are 1155 results for: content related to: Residual energy-based replica detection scheme for mobile wireless sensor networks

  1. New method of key-dependent message security for asymmetric encryption

    Security and Communication Networks

    Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang and Fenghe Wang

    Article first published online : 14 NOV 2014, DOI: 10.1002/sec.1160

  2. A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario

    Security and Communication Networks

    Fajiang Yu, Huanguo Zhang, Bo Zhao, Juan Wang, Liqiang Zhang, Fei Yan and Zhenlin Chen

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1193

  3. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Article first published online : 12 JAN 2015, DOI: 10.1002/sec.1164

  4. A privacy preserving authentication scheme for roaming services in global mobility networks

    Security and Communication Networks

    Gefei Zhang, Dan Fan, Yuqing Zhang, Xiaowei Li and Xuefeng Liu

    Article first published online : 9 FEB 2015, DOI: 10.1002/sec.1209

  5. A general two-party bi-input private function evaluation protocol

    Security and Communication Networks

    Yi Sun and Qiaoyan Wen

    Article first published online : 28 JAN 2015, DOI: 10.1002/sec.1197

  6. Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.940

  7. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

    Security and Communication Networks

    Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 23 OCT 2014, DOI: 10.1002/sec.1139

  8. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Article first published online : 26 MAY 2014, DOI: 10.1002/sec.1036

  9. A provably secure identity-based proxy ring signature based on RSA

    Security and Communication Networks

    Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh and Willy Susilo

    Article first published online : 21 JUL 2014, DOI: 10.1002/sec.1076

  10. Preserving identity privacy on multi-owner cloud data during public verification

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2104–2113, Boyang Wang, Hui Li, Xuefeng Liu, Xiaoqing Li and Fenghua Li

    Article first published online : 10 DEC 2013, DOI: 10.1002/sec.922

  11. DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS

    Security and Communication Networks

    Xiuxia Tian, Ling Huang, Yong Wang, Chaofeng Sha and Xiaoling Wang

    Article first published online : 9 SEP 2014, DOI: 10.1002/sec.1098

  12. Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1805–1814, Baocang Wang, Yupu Hu and Xixiang Lv

    Article first published online : 8 NOV 2013, DOI: 10.1002/sec.881

  13. One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Dennis Y.W. Liu and Duncan S. Wong

    Article first published online : 4 JUL 2013, DOI: 10.1002/sec.812

  14. An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 245–260, Lili Xu and Fan Wu

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.977

  15. Authenticated key exchange with synchronized state

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2373–2388, Zheng Yang and Fei Guo

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.948

  16. Signer-admissible strong designated verifier signature from bilinear pairings

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 422–428, Huaqun Wang

    Article first published online : 14 JUN 2013, DOI: 10.1002/sec.805

  17. Timed-release oblivious transfer

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1138–1149, Lingling Xu, Fangguo Zhang and Shaohua Tang

    Article first published online : 28 AUG 2013, DOI: 10.1002/sec.845

  18. Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions

    Security and Communication Networks

    Jinyong Chang and Rui Xue

    Article first published online : 2 SEP 2014, DOI: 10.1002/sec.1101

  19. Lattice-based obfuscation for re-encryption functions

    Security and Communication Networks

    Rong Cheng and Fangguo Zhang

    Article first published online : 19 OCT 2014, DOI: 10.1002/sec.1112

  20. A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction

    Security and Communication Networks

    Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong and Xiaohua Jia

    Article first published online : 13 FEB 2015, DOI: 10.1002/sec.1208