Search Results

There are 1274 results for: content related to: Residual energy-based replica detection scheme for mobile wireless sensor networks

  1. Efficient oblivious transfer with adaptive queries in UC framework

    Security and Communication Networks

    Vandana Guleria and Ratna Dutta

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1505

  2. Towards fair mutual private set intersection with linear complexity

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1589–1612, Sumit Kumar Debnath and Ratna Dutta

    Version of Record online : 6 MAR 2016, DOI: 10.1002/sec.1450

  3. Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1676–1697, Yoshikazu Hanatani, Goichiro Hanaoka, Takahiro Matsuda and Takashi Yamakawa

    Version of Record online : 2 MAR 2016, DOI: 10.1002/sec.1444

  4. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3356–3371, Zheng Yang, Wu Yang, Lingyun Zhu and Daigu Zhang

    Version of Record online : 19 MAY 2015, DOI: 10.1002/sec.1263

  5. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Version of Record online : 1 JUN 2015, DOI: 10.1002/sec.1285

  6. Anonymous attribute-based proxy re-encryption for access control in cloud computing

    Security and Communication Networks

    Yinghui Zhang, Jin Li, Xiaofeng Chen and Hui Li

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1509

  7. Refined Shacham–Waters ring signature scheme in Seo–Cheon framework

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2122–2134, M. Prem Laxman Das, Jothi Rangasamy and R. Kabaleeshwaran

    Version of Record online : 12 MAY 2016, DOI: 10.1002/sec.1470

  8. Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4157–4176, Y. Sreenivasa Rao and Ratna Dutta

    Version of Record online : 26 AUG 2015, DOI: 10.1002/sec.1331

  9. Signcryption KEM/tag-KEM, revisited

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3067–3082, Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng and Yuan Zhou

    Version of Record online : 25 MAR 2015, DOI: 10.1002/sec.1232

  10. Public-key encryption with keyword search secure against continual memory attacks

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1613–1629, Chengyu Hu, Rupeng Yang, Pengtao Liu, Zuoxia Yu, Yongbin Zhou and Qiuliang Xu

    Version of Record online : 12 FEB 2016, DOI: 10.1002/sec.1451

  11. Privacy-preserving grouping proof with key exchange in the multiple-party setting

    Security and Communication Networks

    Yangguang Tian, Guomin Yang and Yi Mu

    Version of Record online : 14 JUL 2016, DOI: 10.1002/sec.1529

  12. Generic constructions of secure-channel free searchable encryption with adaptive security

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1547–1560, Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman and Kazumasa Omote

    Version of Record online : 25 SEP 2014, DOI: 10.1002/sec.1103

  13. Identity-based signcryption from lattices

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3751–3770, Jianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang and Wenbin Yao

    Version of Record online : 23 JUL 2015, DOI: 10.1002/sec.1297

  14. Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2214–2231, SK Hafizul Islam, Muhammad Khurram Khan and Ali M. Al-Khouri

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1165

  15. Generic transformations for existentially unforgeable signature schemes in the bounded leakage model

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1829–1842, Yuyu Wang and Keisuke Tanaka

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1436

  16. A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3167–3179, Haiyan Sun, Qiaoyan Wen, Hua Zhang and Zhengping Jin

    Version of Record online : 23 MAR 2015, DOI: 10.1002/sec.1241

  17. Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3323–3334, Yuan Chen and Qingkuan Dong

    Version of Record online : 30 APR 2015, DOI: 10.1002/sec.1256

  18. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  19. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1036

  20. Verifiable attribute-based proxy re-encryption for secure public cloud data sharing

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1748–1758, Suqing Lin, Rui Zhang and Mingsheng Wang

    Version of Record online : 10 FEB 2016, DOI: 10.1002/sec.1446