Search Results

There are 2984 results for: content related to: Trust modeling for message relay control and local action decision making in VANETs

  1. Provably secure three-factor authentication and key agreement scheme for session initiation protocol

    Security and Communication Networks

    Sravani Challa, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Fan Wu and Xiong Li

    Version of Record online : 28 NOV 2016, DOI: 10.1002/sec.1707

  2. Active jamming for multi-user information security improvement with the access statuses of users

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3893–3910, Datong Xu, Pinyi Ren, Qinghe Du and Li Sun

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1592

  3. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4136–4156, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Version of Record online : 27 AUG 2015, DOI: 10.1002/sec.1330

  4. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Version of Record online : 19 JUN 2012, DOI: 10.1002/sec.542

  5. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  6. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  7. A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4650–4666, Ruhul Amin, SK Hafizul Islam, G.P. Biswas, Debasis Giri, Muhammad Khurram Khan and Neeraj Kumar

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1655

  8. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.878

  9. Efficient oblivious transfer with adaptive queries in UC framework

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2592–2611, Vandana Guleria and Ratna Dutta

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1505

  10. Security analysis and design of an efficient ECC-based two-factor password authentication scheme

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4166–4181, Tanmoy Maitra, Mohammad S. Obaidat, SK Hafizul Islam, Debasis Giri and Ruhul Amin

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1596

  11. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2070–2092, Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and Xiong Li

    Version of Record online : 23 FEB 2016, DOI: 10.1002/sec.1464

  12. Anonymous attribute-based proxy re-encryption for access control in cloud computing

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2397–2411, Yinghui Zhang, Jin Li, Xiaofeng Chen and Hui Li

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1509

  13. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2507–2523, Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Version of Record online : 23 JAN 2015, DOI: 10.1002/sec.1192

  14. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.328

  15. Yet another attack on the chinese remainder theorem-based hierarchical access control scheme

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1079–1095, Niu Liu, Shaohua Tang and Lingling Xu

    Version of Record online : 5 JUL 2013, DOI: 10.1002/sec.837

  16. Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments

    Security and Communication Networks

    Mustapha Benssalah, Mustapha Djeddou and Karim Drouiche

    Version of Record online : 8 NOV 2016, DOI: 10.1002/sec.1665

  17. Provably secure biometric-based user authentication and key agreement scheme in cloud computing

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4103–4119, Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li and Fan Wu

    Version of Record online : 9 SEP 2016, DOI: 10.1002/sec.1591

  18. Provably secure user authentication and key agreement scheme for wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3670–3687, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu and Xinyi Huang

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1573

  19. A comprehensive analysis for fair probability marking based traceback approach in WSNs

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2448–2475, Anfeng Liu, Xiao Liu and Yuxin Liu

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1515

  20. Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 1983–2001, Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li and Fan Wu

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1452