Search Results

There are 5701 results for: content related to: Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks

  1. An ID-based node key management scheme based on PTPM in MANETs

    Security and Communication Networks

    Guang Yang, Jiqiang Liu and Lei Han

    Version of Record online : 12 MAR 2015, DOI: 10.1002/sec.1206

  2. Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2214–2231, SK Hafizul Islam, Muhammad Khurram Khan and Ali M. Al-Khouri

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1165

  3. Certificateless online/offline signcryption scheme

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 1979–1990, Jiguo Li, Jingjing Zhao and Yichen Zhang

    Version of Record online : 21 DEC 2014, DOI: 10.1002/sec.1146

  4. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  5. Certificateless and certificate-based signatures from lattices

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1575–1586, Miaomiao Tian and Liusheng Huang

    Version of Record online : 27 OCT 2014, DOI: 10.1002/sec.1105

  6. Security analysis of SM2 key exchange protocol in TPM2.0

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 383–395, Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin and Dengguo Feng

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.987

  7. Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 445–454, Wenjie Yang, Futai Zhang and Limin Shen

    Version of Record online : 23 JUL 2013, DOI: 10.1002/sec.826

  8. Security bootstrapping of mobile ad hoc networks using identity-based cryptography

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1374–1383, Kamal Adli Mehr and Javad Musevi Niya

    Version of Record online : 1 FEB 2016, DOI: 10.1002/sec.1423

  9. NCLAS: a novel and efficient certificateless aggregate signature scheme

    Security and Communication Networks

    Haohao Nie, Yanping Li, Weifeng Chen and Yong Ding

    Version of Record online : 14 JUL 2016, DOI: 10.1002/sec.1519

  10. Signcryption KEM/tag-KEM, revisited

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3067–3082, Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng and Yuan Zhou

    Version of Record online : 25 MAR 2015, DOI: 10.1002/sec.1232

  11. Efficient revocable certificateless public key encryption with a delegated revocation authority

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3713–3725, Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang

    Version of Record online : 15 JUN 2015, DOI: 10.1002/sec.1294

  12. Certificateless aggregate signature with efficient verification

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2232–2243, Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang and Gwoboa Horng

    Version of Record online : 13 NOV 2014, DOI: 10.1002/sec.1166

  13. Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4319–4332, SK Hafizul Islam and Mohammad S. Obaidat

    Version of Record online : 7 SEP 2015, DOI: 10.1002/sec.1344

  14. A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3167–3179, Haiyan Sun, Qiaoyan Wen, Hua Zhang and Zhengping Jin

    Version of Record online : 23 MAR 2015, DOI: 10.1002/sec.1241

  15. Efficient chosen ciphertext secure identity-based encryption against key leakage attacks

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1417–1434, Shi-Feng Sun, Dawu Gu and Shengli Liu

    Version of Record online : 2 FEB 2016, DOI: 10.1002/sec.1429

  16. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Version of Record online : 24 FEB 2012, DOI: 10.1002/sec.509

  17. On the security of a lightweight authentication and encryption scheme for mobile ad hoc network

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3094–3098, Wun-She Yap, Joseph K. Liu, Syh-Yuan Tan and Bok-Min Goi

    Version of Record online : 10 FEB 2015, DOI: 10.1002/sec.1234

  18. Efficient revocable identity-based encryption from multilinear maps

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3511–3522, Xianping Mao, Junzuo Lai, Kefei Chen, Jian Weng and Qixiang Mei

    Version of Record online : 11 MAY 2015, DOI: 10.1002/sec.1274

  19. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1036

  20. Provably secure group key agreement protocol based on ECDH with integrated signature

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1085–1102, Vankamamidi S. Naresh and Nistala V. E. S. Murthy

    Version of Record online : 29 DEC 2015, DOI: 10.1002/sec.1402