Search Results

There are 76434 results for: content related to: A secure cryptosystem based on affine transformation

  1. SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 122–135, Jun Shao, Zhenfu Cao and Peng Liu

    Version of Record online : 6 MAY 2009, DOI: 10.1002/sec.109

  2. Cryptosystems based on continued fractions

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1199–1211, Ali Kanso

    Version of Record online : 3 DEC 2010, DOI: 10.1002/sec.255

  3. Attacks on a lightweight cipher based on a multiple recursive generator

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 601–607, Lu Xiao and Gregory G. Rose

    Version of Record online : 25 JAN 2010, DOI: 10.1002/sec.189

  4. A new biometric identity based encryption scheme secure against DoS attacks

    Security and Communication Networks

    Volume 4, Issue 1, January 2011, Pages: 23–32, Neyire Deniz Sarier

    Version of Record online : 9 DEC 2009, DOI: 10.1002/sec.162

  5. A non-associative lattice-based public key cryptosystem

    Security and Communication Networks

    Volume 5, Issue 2, February 2012, Pages: 145–163, Ehsan Malekian and Ali Zakerolhosseini

    Version of Record online : 2 FEB 2011, DOI: 10.1002/sec.297

  6. Security of the GPT cryptosystem and its applications to cryptography

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 937–946, Haitham Rashwan, Ernst M. Gabidulin and Bahram Honary

    Version of Record online : 22 OCT 2010, DOI: 10.1002/sec.228

  7. An efficient and provably secure public key encryption scheme based on coding theory

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1440–1447, Rongxing Lu, Xiaodong Lin, Xiaohui Liang and Xuemin (Sherman) Shen

    Version of Record online : 13 DEC 2010, DOI: 10.1002/sec.274

  8. Identity-based multi-receiver threshold signcryption scheme

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1331–1337, Huawang Qin, Yuewei Dai and Zhiquan Wang

    Version of Record online : 5 NOV 2010, DOI: 10.1002/sec.259

  9. An efficient scheme to handle bursty behavior in secure group communication using binomial key trees

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 1027–1043, R. Aparna and B. B. Amberker

    Version of Record online : 4 OCT 2010, DOI: 10.1002/sec.250

  10. Digital credentials with privacy-preserving delegation

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 825–838, D. A. Knox and C. Adams

    Version of Record online : 15 JUL 2010, DOI: 10.1002/sec.213

  11. Identification with encrypted biometric data

    Security and Communication Networks

    Volume 4, Issue 5, May 2011, Pages: 548–562, Julien Bringer, Hervé Chabanne and Bruno Kindarji

    Version of Record online : 9 JUN 2010, DOI: 10.1002/sec.206

  12. Swarm intelligence based key generation for stream cipher

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 181–194, N. K. Sreelaja and G. A. Vijayalakshmi Pai

    Version of Record online : 20 AUG 2009, DOI: 10.1002/sec.132

  13. An elliptic curve secret sharing key management scheme for mobile ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1405–1419, Hisham Dahshan and James Irvine

    Version of Record online : 10 MAR 2011, DOI: 10.1002/sec.270

  14. A formal separation method of protocols to eliminate parallel attacks in virtual organization

    Security and Communication Networks

    Volume 4, Issue 12, December 2011, Pages: 1461–1468, Hui Zhao, Mingchu Li and Xinxin Fan

    Version of Record online : 4 FEB 2011, DOI: 10.1002/sec.281

  15. A formal approach to robustness testing of network protocol with time constraints

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 622–632, Xia Yin, Zhiliang Wang, Chuanming Jing and Jianping Wu

    Version of Record online : 5 FEB 2010, DOI: 10.1002/sec.193

  16. Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 109–121, Dai Thanh Tran and Johnson I. Agbinya

    Version of Record online : 1 APR 2009, DOI: 10.1002/sec.106

  17. A novel approach to build QKD relaying models

    Security and Communication Networks

    Volume 4, Issue 4, April 2011, Pages: 347–356, Quoc-Cuong Le and Patrick Bellot

    Version of Record online : 25 SEP 2009, DOI: 10.1002/sec.139

  18. An efficient random key distribution scheme for large-scale distributed sensor networks

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 162–180, Ashok Kumar Das

    Version of Record online : 30 JUN 2009, DOI: 10.1002/sec.123

  19. End-to-end protocol to secure ad hoc networks against wormhole attacks

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 994–1002, Sandhya Khurana and Neelima Gupta

    Version of Record online : 12 JAN 2011, DOI: 10.1002/sec.272

  20. Synthesis of attack actions using model checking for the verification of security protocols

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 147–161, Stylianos Basagiannis, Panagiotis Katsaros and Andrew Pombortsis

    Version of Record online : 12 JUN 2009, DOI: 10.1002/sec.119