Search Results

There are 7824 results for: content related to: SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption

  1. A provably secure threshold signature scheme based on DDH assumption

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 678–684, Xiaodong Lin

    Version of Record online : 26 MAY 2010, DOI: 10.1002/sec.203

  2. Secure and robust threshold key management (SRKM) scheme for ad hoc networks

    Security and Communication Networks

    Volume 3, Issue 6, November/December 2010, Pages: 517–534, K. Hamouid and K. Adi

    Version of Record online : 17 FEB 2010, DOI: 10.1002/sec.199

  3. Sharp estimates for solutions of multi-bubbles in compact Riemann surfaces

    Communications on Pure and Applied Mathematics

    Volume 55, Issue 6, June 2002, Pages: 728–771, Chiun-Chuan Chen and Chang-Shou Lin

    Version of Record online : 30 NOV 2001, DOI: 10.1002/cpa.3014

  4. An elliptic curve secret sharing key management scheme for mobile ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1405–1419, Hisham Dahshan and James Irvine

    Version of Record online : 10 MAR 2011, DOI: 10.1002/sec.270

  5. Anonymous proxy re-encryption

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 439–449, Jun Shao, Peng Liu, Guiyi Wei and Yun Ling

    Version of Record online : 4 MAY 2011, DOI: 10.1002/sec.326

  6. Efficient multiple sources network coding signature in the standard model

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 10, July 2015, Pages: 2616–2636, Jinlin Zhang, Jun Shao, Yun Ling, Min Ji, Guiyi Wei and Bishan Ying

    Version of Record online : 25 JUL 2014, DOI: 10.1002/cpe.3322

  7. More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 173–181, Hongbing Wang and Zhenfu Cao

    Version of Record online : 5 JUN 2012, DOI: 10.1002/sec.552

  8. Certificateless online/offline signcryption scheme

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 1979–1990, Jiguo Li, Jingjing Zhao and Yichen Zhang

    Version of Record online : 21 DEC 2014, DOI: 10.1002/sec.1146

  9. You have free access to this content
    AN INTEGRATIVE APPROACH TO DISTINGUISHING THE LATE PERMIAN DICYNODONT SPECIES OUDENODON BAINII AND TROPIDOSTOMA MICROTREMA (THERAPSIDA: ANOMODONTIA)

    Palaeontology

    Volume 50, Issue 5, September 2007, Pages: 1175–1209, J. BOTHA and K. D. ANGIELCZYK

    Version of Record online : 14 SEP 2007, DOI: 10.1111/j.1475-4983.2007.00697.x

  10. Relationships Among Tests for Censored Data

    Biometrical Journal

    Volume 47, Issue 3, June 2005, Pages: 377–387, Emilio Letón and Pilar Zuluaga

    Version of Record online : 8 JUN 2005, DOI: 10.1002/bimj.200410115

  11. SCN-SI-021 achieving privacy and access control in pervasive computing environments

    Security and Communication Networks

    Volume 9, Issue 2, 25 January 2016, Pages: 94–105, Emmanouil Magkos and Panayiotis Kotzanikolaou

    Version of Record online : 8 FEB 2011, DOI: 10.1002/sec.283

  12. Privacy preserving revocable predicate encryption revisited

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 471–485, Kwangsu Lee, Intae Kim and Seong Oun Hwang

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.994

  13. Identification with encrypted biometric data

    Security and Communication Networks

    Volume 4, Issue 5, May 2011, Pages: 548–562, Julien Bringer, Hervé Chabanne and Bruno Kindarji

    Version of Record online : 9 JUN 2010, DOI: 10.1002/sec.206

  14. A security communication model based on certificateless online/offline signcryption for Internet of Things

    Security and Communication Networks

    Volume 7, Issue 10, October 2014, Pages: 1560–1569, Ming Luo, Min Tu and Jianfeng Xu

    Version of Record online : 4 JUL 2013, DOI: 10.1002/sec.836

  15. Protocol for ownership transfer across authorities: with the ability to assign transfer target

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 164–177, Ming Hour Yang and Hung Yuan Hu

    Version of Record online : 25 FEB 2011, DOI: 10.1002/sec.300

  16. An efficient and provably secure public key encryption scheme based on coding theory

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1440–1447, Rongxing Lu, Xiaodong Lin, Xiaohui Liang and Xuemin (Sherman) Shen

    Version of Record online : 13 DEC 2010, DOI: 10.1002/sec.274

  17. Authenticated key exchange protocol with enhanced freshness properties

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1130–1136, Hai Huang and Zhenfu Cao

    Version of Record online : 28 AUG 2010, DOI: 10.1002/sec.238

  18. Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks

    Security and Communication Networks

    Volume 4, Issue 1, January 2011, Pages: 11–22, Yanjiang Yang, Jianying Zhou, Robert H. Deng and Feng Bao

    Version of Record online : 11 JAN 2010, DOI: 10.1002/sec.179

  19. Testing for independence in J×K contingency tables with complex sample survey data

    Biometrics

    Volume 71, Issue 3, September 2015, Pages: 832–840, Stuart R. Lipsitz, Garrett M. Fitzmaurice, Debajyoti Sinha, Nathanael Hevelone, Edward Giovannucci and Jim C. Hu

    Version of Record online : 11 MAR 2015, DOI: 10.1111/biom.12297

  20. You have free access to this content
    Structured maintenance policies on interior sample paths

    Naval Research Logistics (NRL)

    Volume 54, Issue 6, September 2007, Pages: 645–655, Lisa M. Maillart and Ludmila Zheltova

    Version of Record online : 17 MAY 2007, DOI: 10.1002/nav.20236