Search Results

There are 16309 results for: content related to: A new certificateless signature scheme under enhanced security models

  1. You have full text access to this Open Access content
    A new efficient signcryption scheme in the standard model

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 778–789, Zheng Yang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1034

  2. Performance of opportunistic relaying with truncated ARQ over Nakagami-m fading channels

    Transactions on Emerging Telecommunications Technologies

    Volume 23, Issue 1, January 2012, Pages: 50–66, Chao Zhai, Hongji Xu, Ju Liu, Lina Zheng and Yong Zhou

    Version of Record online : 26 SEP 2011, DOI: 10.1002/ett.1508

  3. You have full text access to this Open Access content
    Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 740–750, Joonsang Baek, Young-ji Byon, Eman Hableel and Mahmoud Al-Qutayri

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1021

  4. You have full text access to this Open Access content
    n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 550–564, Zhengan Huang, Shengli Liu and Kefei Chen

    Version of Record online : 4 APR 2014, DOI: 10.1002/sec.1002

  5. You have full text access to this Open Access content
    On cross-correlation properties of S-boxes and their design using semi-bent functions

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 790–800, Enes Pasalic, Samed Bajrić and Milan Djordjević

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1035

  6. You have full text access to this Open Access content
    Privacy preserving revocable predicate encryption revisited

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 471–485, Kwangsu Lee, Intae Kim and Seong Oun Hwang

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.994

  7. You have full text access to this Open Access content
    Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 445–454, Wenjie Yang, Futai Zhang and Limin Shen

    Version of Record online : 23 JUL 2013, DOI: 10.1002/sec.826

  8. Provably secure certificate-based key-insulated signature scheme

    Concurrency and Computation: Practice and Experience

    Volume 26, Issue 8, 10 June 2014, Pages: 1546–1560, Jiguo Li, Haiting Du, Yichen Zhang, Tao Li and Yuexin Zhang

    Version of Record online : 8 APR 2013, DOI: 10.1002/cpe.3019

  9. Performance analysis of cooperative network over Nakagami and Rician fading channels

    International Journal of Communication Systems

    Volume 27, Issue 11, November 2014, Pages: 2703–2722, I. Khan, N. Rajatheva, S. A. Tanoli and S. Jan

    Version of Record online : 16 JAN 2013, DOI: 10.1002/dac.2500

  10. You have full text access to this Open Access content
    A nonmonotonic modal authorization logic for pervasive computing

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1077–1091, Ali Noorollahi and Mehran S. Fallah

    Version of Record online : 8 JUL 2014, DOI: 10.1002/sec.1063

  11. You have full text access to this Open Access content
    Attribute-based signature for threshold predicates from lattices

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 811–821, Qingbin Wang and Shaozhen Chen

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1038

  12. You have full text access to this Open Access content
    MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1641–1651, Hongbing Wang, Peng Zeng and Kim-Kwang Raymond Choo

    Version of Record online : 19 AUG 2013, DOI: 10.1002/sec.861

  13. You have full text access to this Open Access content
    Security enhancement of the authenticated RFID security mechanism based on chaotic maps

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2356–2372, Mustapha Benssalah, Mustapha Djeddou and Karim Drouiche

    Version of Record online : 16 JAN 2014, DOI: 10.1002/sec.946

  14. You have full text access to this Open Access content
    Weaknesses in a new ultralightweight RFID authentication protocol with permutation—RAPP

    Security and Communication Networks

    Volume 7, Issue 6, June 2014, Pages: 945–949, Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez and Juan E. Tapiador

    Version of Record online : 21 JUN 2013, DOI: 10.1002/sec.803

  15. You have full text access to this Open Access content
    Efficient identity-based broadcast signcryption schemes

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 914–925, Intae Kim and Seong Oun Hwang

    Version of Record online : 12 JUL 2013, DOI: 10.1002/sec.802

  16. You have full text access to this Open Access content
    Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1843–1863, Yanfei Guo and Zhenfeng Zhang

    Version of Record online : 27 AUG 2013, DOI: 10.1002/sec.868

  17. You have full text access to this Open Access content
    Reliability enhancement for CIR-based physical layer authentication

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 661–671, Jiazi Liu, Ahmed Refaey, Xianbin Wang and Helen Tang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1014

  18. Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings

    International Journal of Communication Systems

    Volume 27, Issue 7, July 2014, Pages: 1083–1090, Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu

    Version of Record online : 27 JUN 2012, DOI: 10.1002/dac.2388

  19. You have full text access to this Open Access content
    Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks

    Wireless Communications and Mobile Computing

    Volume 14, Issue 10, July 2014, Pages: 995–1006, Wen-Bin Hsieh and Jenq-Shiou Leu

    Version of Record online : 26 JUN 2012, DOI: 10.1002/wcm.2252

  20. You have full text access to this Open Access content
    Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1698–1716, Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827