Search Results

There are 12707 results for: content related to: Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy

  1. Remote three-factor authentication scheme based on Fuzzy extractors

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 682–693, Min Zhang, Jiashu Zhang and Ying Zhang

    Article first published online : 5 MAY 2014, DOI: 10.1002/sec.1016

  2. Efficient and fault-diagnosable authentication architecture for AMI in smart grid

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 598–616, Depeng Li, Zeyar Aung, John R. Williams and Abel Sanchez

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1006

  3. A ciphertext-policy hidden vector encryption scheme supporting multiuser keyword search

    Security and Communication Networks

    Liao Zhenhua, Wang Jinmiao and Lang Bo

    Article first published online : 22 JUN 2014, DOI: 10.1002/sec.1044

  4. Design of secure access control scheme for personal health record-based cloud healthcare service

    Security and Communication Networks

    Chia-Hui Liu, Fong-Qi Lin, Chin-Sheng Chen and Tzer-Shyong Chen

    Article first published online : 8 AUG 2014, DOI: 10.1002/sec.1087

  5. Balanced double subset difference broadcast encryption scheme

    Security and Communication Networks

    Shyh-Yih Wang, Wu-Chuan Yang and Ying-Jen Lin

    Article first published online : 5 AUG 2014, DOI: 10.1002/sec.1093

  6. A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems

    Security and Communication Networks

    Wenfang Zhang, Xiaomin Wang and Muhammad Khurram Khan

    Article first published online : 10 JUN 2014, DOI: 10.1002/sec.1051

  7. A new method of formalizing anonymity based on protocol composition logic

    Security and Communication Networks

    Tao Feng, Shining Han, Xian Guo and Donglin Ma

    Article first published online : 8 OCT 2014, DOI: 10.1002/sec.1068

  8. An enhanced Kerberos protocol with non-interactive zero-knowledge proof

    Security and Communication Networks

    Yuesheng Zhu, Limin Ma and Jinjiang Zhang

    Article first published online : 19 JUN 2014, DOI: 10.1002/sec.1066

  9. Fast authentication mechanism with provable correctness for cluster-based VANETs

    Security and Communication Networks

    Volume 7, Issue 6, June 2014, Pages: 1016–1030, Jung-San Lee and Ya-Chieh Huang

    Article first published online : 14 JUN 2013, DOI: 10.1002/sec.818

  10. Analysis and improvement of a multi-factor biometric authentication scheme

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 617–625, Liling Cao and Wancheng Ge

    Article first published online : 7 MAY 2014, DOI: 10.1002/sec.1010

  11. DMAM: distributed mobility and authentication mechanism in next generation networks

    Security and Communication Networks

    Muhammad Zubair, Xiangwei Kong and Saeed Mahfooz

    Article first published online : 22 JUN 2014, DOI: 10.1002/sec.1041

  12. Server-aided batch verification signature schemes in the multiple-signer setting

    Security and Communication Networks

    Volume 6, Issue 11, November 2013, Pages: 1359–1366, Bin Wang and Qing Zhao

    Article first published online : 15 APR 2013, DOI: 10.1002/sec.718

  13. Elliptic-curve scalar multiplication algorithm using ZOT structure

    Security and Communication Networks

    Hani Almimi, Azman Samsudin and Shahram Jahani

    Article first published online : 15 JUN 2014, DOI: 10.1002/sec.1047

  14. Evaluating and selecting the biometrics in network security

    Security and Communication Networks

    Che-Hung Liu, Jen-Sheng Wang, Chih-Chiang Peng and Joseph Z. Shyu

    Article first published online : 3 JUL 2014, DOI: 10.1002/sec.1020

  15. Reversible data hiding exploiting high-correlation regulation for high-quality images

    Security and Communication Networks

    Xing-Tian Wang, Ming-Chu Li, Szu-Ting Wang and Chin-Chen Chang

    Article first published online : 27 AUG 2014, DOI: 10.1002/sec.1083

  16. Certificateless online/offline signcryption scheme

    Security and Communication Networks

    Jiguo Li, Jingjing Zhao and Yichen Zhang

    Article first published online : 21 DEC 2014, DOI: 10.1002/sec.1146

  17. Secure publish/subscribe-based certificate status validations in mobile ad hoc networks

    Security and Communication Networks

    Mohammad Masdari, Sam Jabbehdari and Jamshid Bagherzadeh

    Article first published online : 24 AUG 2014, DOI: 10.1002/sec.1062

  18. Bloom-filter based IP-CHOCK detection scheme for denial of service attacks in VANET

    Security and Communication Networks

    Karan Verma and Halabi Hasbullah

    Article first published online : 2 JUN 2014, DOI: 10.1002/sec.1043

  19. Modeling, conflict detection, and verification of a new virtualization role-based access control framework

    Security and Communication Networks

    Yang Luo, Chunhe Xia, Liangshuang Lv, Zhao Wei and Yazhuo Li

    Article first published online : 23 JUN 2014, DOI: 10.1002/sec.1025

  20. A fault recovery-based scheduling algorithm for cloud service reliability

    Security and Communication Networks

    Ping Qi and Longshu Li

    Article first published online : 5 MAY 2014, DOI: 10.1002/sec.1017