Search Results

There are 16596 results for: content related to: Policy override in practice: model, evaluation, and decision support

  1. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Version of Record online : 19 JUN 2012, DOI: 10.1002/sec.542

  2. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  3. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  4. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  5. Active jamming for multi-user information security improvement with the access statuses of users

    Security and Communication Networks

    Datong Xu, Pinyi Ren, Qinghe Du and Li Sun

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1592

  6. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.878

  7. Efficient oblivious transfer with adaptive queries in UC framework

    Security and Communication Networks

    Vandana Guleria and Ratna Dutta

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1505

  8. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.328

  9. Yet another attack on the chinese remainder theorem-based hierarchical access control scheme

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1079–1095, Niu Liu, Shaohua Tang and Lingling Xu

    Version of Record online : 5 JUL 2013, DOI: 10.1002/sec.837

  10. Provably secure user authentication and key agreement scheme for wireless sensor networks

    Security and Communication Networks

    Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu and Xinyi Huang

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1573

  11. A comprehensive analysis for fair probability marking based traceback approach in WSNs

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2448–2475, Anfeng Liu, Xiao Liu and Yuxin Liu

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1515

  12. Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 1983–2001, Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li and Fan Wu

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1452

  13. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4136–4156, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Version of Record online : 27 AUG 2015, DOI: 10.1002/sec.1330

  14. A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks

    Security and Communication Networks

    Marimuthu Karuppiah, Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu and Sayantani Basu

    Version of Record online : 14 AUG 2016, DOI: 10.1002/sec.1598

  15. Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3415–3440, Jaydeep Howlader and Ashis Kumar Mal

    Version of Record online : 25 MAY 2015, DOI: 10.1002/sec.1268

  16. Analysis on the generalization of proxy signature

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 549–566, Namita Tiwari and Sahadeo Padhye

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.581

  17. Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4319–4332, SK Hafizul Islam and Mohammad S. Obaidat

    Version of Record online : 7 SEP 2015, DOI: 10.1002/sec.1344

  18. Context-aware usage control for web of things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2696–2712, Guangdong Bai, Lin Yan, Liang Gu, Yao Guo and Xiangqun Chen

    Version of Record online : 15 FEB 2012, DOI: 10.1002/sec.424

  19. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3356–3371, Zheng Yang, Wu Yang, Lingyun Zhu and Daigu Zhang

    Version of Record online : 19 MAY 2015, DOI: 10.1002/sec.1263

  20. New method of key-dependent message security for asymmetric encryption

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2157–2170, Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang and Fenghe Wang

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1160