Search Results

There are 63312 results for: content related to: Improvement on the fault-tolerant group key agreement protocol of Zhao et al .

  1. Towards a complete chaotic map-based mobile RFID authentication protocol with efficient anticollision tag indexing

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5278–5294, Mustapha Benssalah, Mustapha Djeddou and Karim Drouiche

    Version of Record online : 17 NOV 2016, DOI: 10.1002/sec.1696

  2. Improvement of robust smart-card-based password authentication scheme

    International Journal of Communication Systems

    Volume 28, Issue 2, 25 January 2015, Pages: 383–393, Qi Jiang, Jianfeng Ma, Guangsong Li and Xinghua Li

    Version of Record online : 18 SEP 2013, DOI: 10.1002/dac.2644

  3. A two-factor authentication scheme with anonymity for multi-server environments

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1608–1625, Chi-Tung Chen and Cheng-Chi Lee

    Version of Record online : 5 SEP 2014, DOI: 10.1002/sec.1109

  4. An improved Western blotting technique effectively reduces background

    ELECTROPHORESIS

    Volume 23, Issue 15, No. 15 August 2002, Pages: 2373–2376, Min Wu, Peter G. Stockley and William J. Martin II

    Version of Record online : 2 AUG 2002, DOI: 10.1002/1522-2683(200208)23:15<2373::AID-ELPS2373>3.0.CO;2-W

  5. Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 4924–4948, Mustapha Benssalah, Mustapha Djeddou and Karim Drouiche

    Version of Record online : 8 NOV 2016, DOI: 10.1002/sec.1665

  6. You have free access to this content
    Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’

    International Journal of Network Management

    Volume 25, Issue 1, January/February 2015, Pages: 31–51, Mohammad Sabzinejad Farash

    Version of Record online : 5 DEC 2014, DOI: 10.1002/nem.1883

  7. Improved group key transfer protocols from the protocol of Harn et al.

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1471–1477, Zhiwei Wang

    Version of Record online : 6 FEB 2012, DOI: 10.1002/sec.415

  8. Cryptanalysis and provable improvement of a chaotic maps-based mobile dynamic ID authenticated key agreement scheme

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 2981–2991, Hongfeng Zhu

    Version of Record online : 10 FEB 2015, DOI: 10.1002/sec.1225

  9. Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction

    International Journal of Communication Systems

    Volume 29, Issue 3, February 2016, Pages: 567–578, Siqi Lu, Jinhua Zhao and Qingfeng Cheng

    Version of Record online : 20 NOV 2014, DOI: 10.1002/dac.2899

  10. Matrix-type FDTD method for hybrid circuits

    International Journal of RF and Microwave Computer-Aided Engineering

    Volume 16, Issue 3, May 2006, Pages: 287–295, Zhenhai Shao and Masayuki Fujise

    Version of Record online : 1 FEB 2006, DOI: 10.1002/mmce.20153

  11. Attacks and improvements to chaotic map-based RFID authentication protocol

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4028–4040, Mete Akgün, Ali Osman Bayrak and Mehmet Ufuk Çaǧlayan

    Version of Record online : 24 JUL 2015, DOI: 10.1002/sec.1319

  12. Using distance covariance for improved variable selection with application to learning genetic risk models

    Statistics in Medicine

    Volume 34, Issue 10, 10 May 2015, Pages: 1708–1720, Jing Kong, Sijian Wang and Grace Wahba

    Version of Record online : 29 JAN 2015, DOI: 10.1002/sim.6441

  13. Cryptanalysis of some conference schemes for mobile communications

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 107–112, Daojing He, Chun Chen, Maode Ma and Jiajun Bu

    Version of Record online : 30 JAN 2011, DOI: 10.1002/sec.284

  14. An authenticated group key distribution protocol based on the generalized Chinese remainder theorem

    International Journal of Communication Systems

    Volume 27, Issue 1, January 2014, Pages: 126–134, Cheng Guo and Chin-Chen Chang

    Version of Record online : 2 APR 2012, DOI: 10.1002/dac.2348

  15. An improved in-gel digestion method for efficient identification of protein and glycosylation analysis of glycoproteins using guanidine hydrochloride

    PROTEOMICS

    Volume 14, Issue 2-3, February 2014, Pages: 196–201, Daisuke Takakura, Noritaka Hashii and Nana Kawasaki

    Version of Record online : 25 JAN 2014, DOI: 10.1002/pmic.201300332

  16. A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 17, 10 December 2015, Pages: 4897–4913, Mohammad Sabzinejad Farash, SK Hafizul Islam and Mohammad S. Obaidat

    Version of Record online : 17 MAR 2015, DOI: 10.1002/cpe.3477

  17. A Simple Numerical Approach Towards Improving the Two One-Sided Test for Average Bioequivalence

    Biometrical Journal

    Volume 50, Issue 2, April 2008, Pages: 205–211, Li Cao and Thomas Mathew

    Version of Record online : 28 MAR 2008, DOI: 10.1002/bimj.200710407

  18. A Welch-type test for homogeneity of contrasts under heteroscedasticity with application to meta-analysis

    Statistics in Medicine

    Volume 23, Issue 23, 15 December 2004, Pages: 3655–3670, E. Kulinskaya, M. B. Dollinger, E. Knight and H. Gao

    Version of Record online : 8 NOV 2004, DOI: 10.1002/sim.1929

  19. Pricing barrier and American options under the SABR model on the graphics processing unit

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 8, 10 June 2012, Pages: 867–879, Yu Tian, Zili Zhu, Fima C. Klebaner and Kais Hamza

    Version of Record online : 7 JUN 2011, DOI: 10.1002/cpe.1771

  20. An improved Rhie–Chow interpolation scheme for the smoothed-interface immersed boundary method

    International Journal for Numerical Methods in Fluids

    Volume 82, Issue 11, 20 December 2016, Pages: 770–795, Wei Yi, Daniel Corbett and Xue-Feng Yuan

    Version of Record online : 10 MAY 2016, DOI: 10.1002/fld.4240