Search Results

There are 7158 results for: content related to: Improved group key transfer protocols from the protocol of Harn et al .

  1. Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1363–1374, Qiuhua Wang, Huifang Chen, Lei Xie and Kuang Wang

    Article first published online : 15 FEB 2012, DOI: 10.1002/sec.429

  2. A new certificateless authenticated key agreement protocol for SIP with different KGCs

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 631–643, Xiaowei Li, Yuqing Zhang and Geifei Zhang

    Article first published online : 5 JUL 2012, DOI: 10.1002/sec.595

  3. Identity-based construction for secure and efficient handoff authentication schemes in wireless networks

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1121–1130, Y. H. Zhang, X. F. Chen, H. Li and J. Cao

    Article first published online : 6 FEB 2012, DOI: 10.1002/sec.421

  4. Improvement on the fault-tolerant group key agreement protocol of Zhao et al.

    Security and Communication Networks

    Zhiwei Wang

    Article first published online : 27 JAN 2012, DOI: 10.1002/sec.414

  5. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Article first published online : 22 FEB 2012, DOI: 10.1002/sec.417

  6. Certificateless identification protocols from super singular elliptic curve

    Security and Communication Networks

    Massoud Hadian Dehkordi and Reza Alimoradi

    Article first published online : 15 AUG 2013, DOI: 10.1002/sec.815

  7. You have free access to this content
    A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  8. New construction of affiliation-hiding authenticated group key agreement

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 723–734, Chang Xu, Hua Guo, Zhoujun Li and Yi Mu

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.606

  9. Efficient identity-based hierarchical access authentication protocol for mobile network

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1509–1521, He Liu and Mangui Liang

    Article first published online : 27 JAN 2012, DOI: 10.1002/sec.412

  10. Public key encryption supporting plaintext equality test and user-specified authorization

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1351–1362, Qiang Tang

    Article first published online : 2 FEB 2012, DOI: 10.1002/sec.418

  11. Context-aware usage control for web of things

    Security and Communication Networks

    Guangdong Bai, Lin Yan, Liang Gu, Yao Guo and Xiangqun Chen

    Article first published online : 15 FEB 2012, DOI: 10.1002/sec.424

  12. On the realization of fuzzy identity-based identification scheme using fingerprint biometrics

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1312–1324, Syh-Yuan Tan, Zhe Jin, Andrew Beng Jin Teoh, Bok-Min Goi and Swee-Huay Heng

    Article first published online : 10 JAN 2012, DOI: 10.1002/sec.408

  13. Detecting SYN flooding attacks based on traffic prediction

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1131–1140, Shangguang Wang, Qibo Sun, Hua Zou and Fangchun Yang

    Article first published online : 24 FEB 2012, DOI: 10.1002/sec.428

  14. Secure identity-based multisignature schemes under quadratic residue assumptions

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 689–701, Lifei Wei, Zhenfu Cao and Xiaolei Dong

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.600

  15. Non-linearity cannot help RFID resist full-disclosure attacks and terrorist fraud attacks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1490–1495, Hung-Yu Chien, Chu-Sing Yang and Hung-Pin Hou

    Article first published online : 27 JAN 2012, DOI: 10.1002/sec.410

  16. A security communication model based on certificateless online/offline signcryption for Internet of Things

    Security and Communication Networks

    Ming Luo, Min Tu and Jianfeng Xu

    Article first published online : 4 JUL 2013, DOI: 10.1002/sec.836

  17. XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1420–1444, Devrim Unal and M. Ufuk Caglayan

    Article first published online : 27 JAN 2012, DOI: 10.1002/sec.411

  18. Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1375–1378, Cheng-Chi Lee, Tsung-Hung Lin and Chwei-Shyong Tsai

    Article first published online : 29 FEB 2012, DOI: 10.1002/sec.430

  19. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Article first published online : 21 JUN 2012, DOI: 10.1002/sec.566

  20. Bayesian Approach with Maximum Entropy Principle for trusted quality of Web service metric in e-commerce applications

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1112–1120, Shangguang Wang, Hua Zou, Qibo Sun and Fangchun Yang

    Article first published online : 24 FEB 2012, DOI: 10.1002/sec.426