Search Results

There are 5867 results for: content related to: How to protect security and privacy in the IoT: a policy-based RFID tag management protocol

  1. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Article first published online : 17 DEC 2012, DOI: 10.1002/sec.650

  2. Security enhancement of the authenticated RFID security mechanism based on chaotic maps

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2356–2372, Mustapha Benssalah, Mustapha Djeddou and Karim Drouiche

    Article first published online : 16 JAN 2014, DOI: 10.1002/sec.946

  3. Attacks and improvements to chaotic map-based RFID authentication protocol

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4028–4040, Mete Akgün, Ali Osman Bayrak and Mehmet Ufuk Çaǧlayan

    Article first published online : 24 JUL 2015, DOI: 10.1002/sec.1319

  4. A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2836–2849, Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong and Xiaohua Jia

    Article first published online : 13 FEB 2015, DOI: 10.1002/sec.1208

  5. Vulnerabilities of an ECC-based RFID authentication scheme

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3262–3270, Nan Li, Yi Mu, Willy Susilo, Fuchun Guo and Vijay Varadharajan

    Article first published online : 26 MAR 2015, DOI: 10.1002/sec.1250

  6. Weaknesses of fingerprint-based mutual authentication protocol

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2124–2134, Pablo Picazo-Sanchez, Lara Ortiz-Martin, Pedro Peris-Lopez and Nasour Bagheri

    Article first published online : 13 NOV 2014, DOI: 10.1002/sec.1161

  7. Parallelizable MAC revisited

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1115–1127, Wun-She Yap, Sze Ling Yeo, Swee-Huay Heng and Matt Henricksen

    Article first published online : 10 JUL 2013, DOI: 10.1002/sec.842

  8. Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Yanfei Guo and Zhenfeng Zhang

    Article first published online : 27 AUG 2013, DOI: 10.1002/sec.868

  9. Context-aware usage control for web of things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2696–2712, Guangdong Bai, Lin Yan, Liang Gu, Yao Guo and Xiangqun Chen

    Article first published online : 15 FEB 2012, DOI: 10.1002/sec.424

  10. An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2527–2541, Chin-Ling Chen and Chun-Yi Wu

    Article first published online : 7 OCT 2011, DOI: 10.1002/sec.383

  11. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4136–4156, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 27 AUG 2015, DOI: 10.1002/sec.1330

  12. Generic constructions of secure-channel free searchable encryption with adaptive security

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1547–1560, Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman and Kazumasa Omote

    Article first published online : 25 SEP 2014, DOI: 10.1002/sec.1103

  13. A provably secure smart card-based authenticated group key exchange protocol

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1602–1607, Chin-Chen Chang and Hai-Duong Le

    Article first published online : 5 SEP 2014, DOI: 10.1002/sec.1107

  14. PFX: an essence of authencryption for block-cipher security

    Security and Communication Networks

    Tzonelih Hwang and Prosanta Gope

    Article first published online : 11 JAN 2016, DOI: 10.1002/sec.1410

  15. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Article first published online : 12 JAN 2015, DOI: 10.1002/sec.1164

  16. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Article first published online : 28 JAN 2015, DOI: 10.1002/sec.1186

  17. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1732–1751, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 23 OCT 2014, DOI: 10.1002/sec.1139

  18. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.915

  19. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  20. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

    Security and Communication Networks

    Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and Xiong Li

    Article first published online : 23 FEB 2016, DOI: 10.1002/sec.1464