Search Results

There are 1823 results for: content related to: DMAM: distributed mobility and authentication mechanism in next generation networks

  1. Hierarchical attribute-based encryption with continuous auxiliary inputs leakage

    Security and Communication Networks

    Yuyan Guo, Jiguo Li, Yichen Zhang and Jian Shen

    Version of Record online : 15 DEC 2016, DOI: 10.1002/sec.1659

  2. Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments

    Security and Communication Networks

    Mustapha Benssalah, Mustapha Djeddou and Karim Drouiche

    Version of Record online : 8 NOV 2016, DOI: 10.1002/sec.1665

  3. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4136–4156, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Version of Record online : 27 AUG 2015, DOI: 10.1002/sec.1330

  4. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  5. Provably secure three-factor authentication and key agreement scheme for session initiation protocol

    Security and Communication Networks

    Sravani Challa, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Fan Wu and Xiong Li

    Version of Record online : 28 NOV 2016, DOI: 10.1002/sec.1707

  6. Active jamming for multi-user information security improvement with the access statuses of users

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3893–3910, Datong Xu, Pinyi Ren, Qinghe Du and Li Sun

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1592

  7. Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3688–3702, Yinghui Zhang, Dong Zheng, Qi Li, Jin Li and Hui Li

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1574

  8. Efficient oblivious transfer with adaptive queries in UC framework

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2592–2611, Vandana Guleria and Ratna Dutta

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1505

  9. A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1384–1397, Zuowen Tan

    Version of Record online : 2 FEB 2016, DOI: 10.1002/sec.1424

  10. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2070–2092, Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and Xiong Li

    Version of Record online : 23 FEB 2016, DOI: 10.1002/sec.1464

  11. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2507–2523, Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Version of Record online : 23 JAN 2015, DOI: 10.1002/sec.1192

  12. A two-factor authentication scheme with anonymity for multi-server environments

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1608–1625, Chi-Tung Chen and Cheng-Chi Lee

    Version of Record online : 5 SEP 2014, DOI: 10.1002/sec.1109

  13. A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3428–3443, Lili Xu and Fan Wu

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1551

  14. Provably secure user authentication and key agreement scheme for wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3670–3687, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu and Xinyi Huang

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1573

  15. Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 1983–2001, Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li and Fan Wu

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1452

  16. An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4615–4638, Tanmoy Maitra, SK Hafizul Islam, Ruhul Amin, Debasis Giri, Muhammad Khurram Khan and Neeraj Kumar

    Version of Record online : 26 OCT 2016, DOI: 10.1002/sec.1653

  17. Centralized keyword search on encrypted data for cloud applications

    Security and Communication Networks

    Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang and Jianchang Lai

    Version of Record online : 16 NOV 2016, DOI: 10.1002/sec.1679

  18. A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4192–4209, Marimuthu Karuppiah, Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu and Sayantani Basu

    Version of Record online : 14 AUG 2016, DOI: 10.1002/sec.1598

  19. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1016–1024, Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu and Yichen Zhang

    Version of Record online : 18 DEC 2015, DOI: 10.1002/sec.1396

  20. Generic constructions of secure-channel free searchable encryption with adaptive security

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1547–1560, Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman and Kazumasa Omote

    Version of Record online : 25 SEP 2014, DOI: 10.1002/sec.1103