Search Results

There are 11557 results for: content related to: A short and highly efficient identity-based designated verifier proxy signature scheme

  1. Attribute-based signature for threshold predicates from lattices

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 811–821, Qingbin Wang and Shaozhen Chen

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1038

  2. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1036

  3. A new efficient signcryption scheme in the standard model

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 778–789, Zheng Yang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1034

  4. Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1843–1863, Yanfei Guo and Zhenfeng Zhang

    Version of Record online : 27 AUG 2013, DOI: 10.1002/sec.868

  5. Reliability enhancement for CIR-based physical layer authentication

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 661–671, Jiazi Liu, Ahmed Refaey, Xianbin Wang and Helen Tang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1014

  6. Authenticated key exchange with synchronized state

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2373–2388, Zheng Yang and Fei Guo

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.948

  7. n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 550–564, Zhengan Huang, Shengli Liu and Kefei Chen

    Version of Record online : 4 APR 2014, DOI: 10.1002/sec.1002

  8. On cross-correlation properties of S-boxes and their design using semi-bent functions

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 790–800, Enes Pasalic, Samed Bajrić and Milan Djordjević

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1035

  9. Privacy preserving revocable predicate encryption revisited

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 471–485, Kwangsu Lee, Intae Kim and Seong Oun Hwang

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.994

  10. Estimating incidence rates using exact or interval-censored data with an application to hospital-acquired infections

    Statistics in Medicine

    Volume 31, Issue 10, 10 May 2012, Pages: 963–977, Lisha Deng, Peter J. Diggle and John Cheesbrough

    Version of Record online : 7 DEC 2011, DOI: 10.1002/sim.4418

  11. Optimal dose-finding designs with correlated continuous and discrete responses

    Statistics in Medicine

    Volume 31, Issue 3, 10 February 2012, Pages: 217–234, Valerii Fedorov, Yuehui Wu and Rongmei Zhang

    Version of Record online : 12 DEC 2011, DOI: 10.1002/sim.4388

  12. Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.940

  13. Variance Estimation and Asymptotic Confidence Bands for the Mean Estimator of Sampled Functional Data with High Entropy Unequal Probability Sampling Designs

    Scandinavian Journal of Statistics

    Volume 41, Issue 2, June 2014, Pages: 516–534, Hervé Cardot, Camelia Goga and Pauline Lardin

    Version of Record online : 25 NOV 2013, DOI: 10.1111/sjos.12048

  14. You have free access to this content
    Parameter Change Test for Poisson Autoregressive Models

    Scandinavian Journal of Statistics

    Volume 41, Issue 4, December 2014, Pages: 1136–1152, Jiwon Kang and Sangyeol Lee

    Version of Record online : 9 APR 2014, DOI: 10.1111/sjos.12088

  15. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.878

  16. You have free access to this content
    Recommended tests and confidence intervals for paired binomial proportions

    Statistics in Medicine

    Volume 33, Issue 16, 20 July 2014, Pages: 2850–2875, Morten W. Fagerland, Stian Lydersen and Petter Laake

    Version of Record online : 20 MAR 2014, DOI: 10.1002/sim.6148

  17. Flexible Copula Density Estimation with Penalized Hierarchical B-splines

    Scandinavian Journal of Statistics

    Volume 40, Issue 4, December 2013, Pages: 685–705, Göran Kauermann, Christian Schellhase and David Ruppert

    Version of Record online : 3 JUN 2013, DOI: 10.1111/sjos.12018

  18. Regression Analysis of Current Status Data Under the Additive Hazards Model with Auxiliary Covariates

    Scandinavian Journal of Statistics

    Volume 42, Issue 1, March 2015, Pages: 118–136, Yanqin Feng, Ling Ma and Jianguo Sun

    Version of Record online : 9 APR 2014, DOI: 10.1111/sjos.12098

  19. Security analysis of SM2 key exchange protocol in TPM2.0

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 383–395, Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin and Dengguo Feng

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.987

  20. A more secure and efficient Andrew Secure RPC protocol

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2063–2077, Sirapat Boonkrong

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.918