Search Results

There are 18291 results for: content related to: Achieving non-transferability in credential systems using hidden biometrics

  1. You have full text access to this Open Access content
    A new biometric identity based encryption scheme secure against DoS attacks

    Security and Communication Networks

    Volume 4, Issue 1, January 2011, Pages: 23–32, Neyire Deniz Sarier

    Version of Record online : 9 DEC 2009, DOI: 10.1002/sec.162

  2. You have full text access to this Open Access content
    SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 122–135, Jun Shao, Zhenfu Cao and Peng Liu

    Version of Record online : 6 MAY 2009, DOI: 10.1002/sec.109

  3. You have full text access to this Open Access content
    A formal separation method of protocols to eliminate parallel attacks in virtual organization

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1461–1468, Hui Zhao, Mingchu Li and Xinxin Fan

    Version of Record online : 4 FEB 2011, DOI: 10.1002/sec.281

  4. You have full text access to this Open Access content
    Interoperable semantic access control for highly dynamic coalitions

    Security and Communication Networks

    Volume 3, Issue 6, November/December 2010, Pages: 565–594, Hristo Koshutanski and Antonio Maña

    Version of Record online : 15 SEP 2009, DOI: 10.1002/sec.148

  5. You have full text access to this Open Access content
    An efficient and provably secure public key encryption scheme based on coding theory

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1440–1447, Rongxing Lu, Xiaodong Lin, Xiaohui Liang and Xuemin (Sherman) Shen

    Version of Record online : 13 DEC 2010, DOI: 10.1002/sec.274

  6. A robust algorithm for the sequential linear analysis of environmental radiological data with imprecise observations

    Environmetrics

    Volume 22, Issue 2, March 2011, Pages: 132–151, Carlos Rivero and Teofilo Valdes

    Version of Record online : 9 DEC 2009, DOI: 10.1002/env.1034

  7. Multivariate extreme value identification using depth functions

    Environmetrics

    Volume 22, Issue 3, May 2011, Pages: 441–455, Fateh Chebana and Taha B.M.J. Ouarda

    Version of Record online : 24 MAR 2011, DOI: 10.1002/env.1089

  8. Self-consistent estimation of mean response functions and their derivatives

    Canadian Journal of Statistics

    Volume 39, Issue 2, June 2011, Pages: 280–299, Richard Charnigo and Cidambi Srinivasan

    Version of Record online : 23 MAY 2011, DOI: 10.1002/cjs.10104

  9. You have full text access to this Open Access content
    Authenticated key exchange protocol with selectable identities

    Wireless Communications and Mobile Computing

    Volume 11, Issue 2, February 2011, Pages: 226–239, Hua Guo, Yi Mu, Xiyong Zhang and Zhoujun Li

    Version of Record online : 15 APR 2010, DOI: 10.1002/wcm.971

  10. Models of expansions of equation image with no end extensions

    Mathematical Logic Quarterly

    Volume 57, Issue 4, August 2011, Pages: 341–365, Saharon Shelah

    Version of Record online : 7 JUN 2011, DOI: 10.1002/malq.200910129

  11. You have full text access to this Open Access content
    Secure and robust threshold key management (SRKM) scheme for ad hoc networks

    Security and Communication Networks

    Volume 3, Issue 6, November/December 2010, Pages: 517–534, K. Hamouid and K. Adi

    Version of Record online : 17 FEB 2010, DOI: 10.1002/sec.199

  12. A set of axioms for nonstandard extensions

    Mathematical Logic Quarterly

    Volume 57, Issue 5, October 2011, Pages: 485–493, Abhijit Dasgupta

    Version of Record online : 18 APR 2011, DOI: 10.1002/malq.201010025

  13. You have full text access to this Open Access content
    Identification with encrypted biometric data

    Security and Communication Networks

    Volume 4, Issue 5, May 2011, Pages: 548–562, Julien Bringer, Hervé Chabanne and Bruno Kindarji

    Version of Record online : 9 JUN 2010, DOI: 10.1002/sec.206

  14. You have full text access to this Open Access content
    A non-associative lattice-based public key cryptosystem

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 145–163, Ehsan Malekian and Ali Zakerolhosseini

    Version of Record online : 2 FEB 2011, DOI: 10.1002/sec.297

  15. A general class of nonseparable space–time covariance models

    Environmetrics

    Volume 22, Issue 2, March 2011, Pages: 224–242, Thaís C. O. Fonseca and Mark F. J. Steel

    Version of Record online : 8 JUN 2010, DOI: 10.1002/env.1047

  16. You have full text access to this Open Access content
    Robust smart-cards-based user authentication scheme with user anonymity

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 236–248, Shuhua Wu, Yuefei Zhu and Qiong Pu

    Version of Record online : 28 APR 2011, DOI: 10.1002/sec.315

  17. You have full text access to this Open Access content
    IDOAKE: strongly secure ID-based one-pass authenticated key exchange protocol

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1153–1161, Hai Huang and Zhenfu Cao

    Version of Record online : 3 DEC 2010, DOI: 10.1002/sec.241

  18. Cinetique de la reduction de l'acetate de CoIII dans l'acide acetique

    The Canadian Journal of Chemical Engineering

    Volume 88, Issue 1, February 2010, Pages: 67–75, Lozar Jean and Lafage Bernard

    Version of Record online : 25 JAN 2010, DOI: 10.1002/cjce.20256

  19. Analytical Study of Discrete Optical Breathers in Spiral Polymer Chain

    Macromolecular Theory and Simulations

    Volume 21, Issue 8, September 2012, Pages: 516–528, Natalya Kovaleva and Leonid Manevitch

    Version of Record online : 31 JUL 2012, DOI: 10.1002/mats.201100115

  20. Function spaces on singular manifolds

    Mathematische Nachrichten

    Volume 286, Issue 5-6, April 2013, Pages: 436–475, H. Amann

    Version of Record online : 4 MAY 2012, DOI: 10.1002/mana.201100157