Search Results

There are 20544 results for: content related to: Improved group key transfer protocols from the protocol of Harn et al .

  1. An authenticated group key distribution mechanism using theory of numbers

    International Journal of Communication Systems

    Volume 27, Issue 11, November 2014, Pages: 3502–3512, Yanjun Liu, Lein Harn and Chin-Chen Chang

    Version of Record online : 4 JUL 2013, DOI: 10.1002/dac.2569

  2. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3282–3299, Jin Cao, Maode Ma and Hui Li

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1252

  3. An authenticated group key distribution protocol based on the generalized Chinese remainder theorem

    International Journal of Communication Systems

    Volume 27, Issue 1, January 2014, Pages: 126–134, Cheng Guo and Chin-Chen Chang

    Version of Record online : 2 APR 2012, DOI: 10.1002/dac.2348

  4. An efficient and attack-resistant key agreement scheme for secure group communications in mobile ad-hoc networks

    Wireless Communications and Mobile Computing

    Volume 8, Issue 10, December 2008, Pages: 1297–1312, Ravi K. Balachandran, Xukai Zou, Byrav Ramamurthy, Amandeep Thukral and Vinodchandran N. Variyam

    Version of Record online : 3 DEC 2007, DOI: 10.1002/wcm.575

  5. An effective key distribution for secure internet pay-TV using access key hierarchies

    Security and Communication Networks

    Pandi Vijayakumar, Ramu Naresh, SK Hafizul Islam and Lazarus Jegatha Deborah

    Version of Record online : 27 OCT 2016, DOI: 10.1002/sec.1680

  6. AD-ASGKA – authenticated dynamic protocols for asymmetric group key agreement

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1340–1352, Mingchu Li, Xiaodong Xu, Cheng Guo and Xing Tan

    Version of Record online : 26 JAN 2016, DOI: 10.1002/sec.1420

  7. Provably secure group key agreement protocol based on ECDH with integrated signature

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1085–1102, Vankamamidi S. Naresh and Nistala V. E. S. Murthy

    Version of Record online : 29 DEC 2015, DOI: 10.1002/sec.1402

  8. An efficient group key agreement protocol for secure P2P communication

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 3952–3965, Pandi Vijayakumar, Ramu Naresh, Lazarus Jegatha Deborah and SK Hafizul Islam

    Version of Record online : 22 AUG 2016, DOI: 10.1002/sec.1578

  9. Secure group and multi-layer group communication schemes based on polynomial interpolation

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 735–756, Purushothama B. R. and B. B. Amberker

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.607

  10. Improvement on the fault-tolerant group key agreement protocol of Zhao et al.

    Security and Communication Networks

    Volume 9, Issue 2, 25 January 2016, Pages: 166–170, Zhiwei Wang

    Version of Record online : 27 JAN 2012, DOI: 10.1002/sec.414

  11. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1036

  12. Centralized group key management mechanism for VANET

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 1035–1043, Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng and Han-Chieh Chao

    Version of Record online : 26 NOV 2012, DOI: 10.1002/sec.676

  13. A new certificateless authenticated key agreement protocol for SIP with different KGCs

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 631–643, Xiaowei Li, Yuqing Zhang and Geifei Zhang

    Version of Record online : 5 JUL 2012, DOI: 10.1002/sec.595

  14. An efficient distributed key management scheme for group-signature based anonymous authentication in VANET

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 79–86, Yipin Sun, Zhenqian Feng, Qiaolin Hu and Jinshu Su

    Version of Record online : 10 MAR 2011, DOI: 10.1002/sec.302

  15. An efficient scheme to handle bursty behavior in secure group communication using binomial key trees

    Security and Communication Networks

    Volume 4, Issue 9, September 2011, Pages: 1027–1043, R. Aparna and B. B. Amberker

    Version of Record online : 4 OCT 2010, DOI: 10.1002/sec.250

  16. A collusion attack on asymmetric group key exchange

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2189–2193, Jikai Teng and Chuankun Wu

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1163

  17. Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1026–1039, Rong Jiang, Rongxing Lu, Jun Luo, Chengzhe Lai and Xuemin (Sherman) Shen

    Version of Record online : 22 AUG 2014, DOI: 10.1002/sec.1057

  18. Certificateless identification protocols from super singular elliptic curve

    Security and Communication Networks

    Volume 7, Issue 6, June 2014, Pages: 979–986, Massoud Hadian Dehkordi and Reza Alimoradi

    Version of Record online : 15 AUG 2013, DOI: 10.1002/sec.815

  19. A three-dimensional model of atmospheric CO2 transport based on observed winds: 1. Analysis of observational data

    Aspects of Climate Variability in the Pacific and the Western Americas

    Charles D. Keeling, R. B. Bacastow, A. F. Carter, S. C. Piper, Timothy P. Whorf, Martin Heimann, Willem G. Mook, Hans Roeloffzen, Pages: 165–236, 2013

    Published Online : 23 MAR 2013, DOI: 10.1029/GM055p0165

  20. Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 445–454, Wenjie Yang, Futai Zhang and Limin Shen

    Version of Record online : 23 JUL 2013, DOI: 10.1002/sec.826