Search Results

There are 6293 results for: content related to: Feature-based Type Identification of File Fragments

  1. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Version of Record online : 19 JUN 2012, DOI: 10.1002/sec.542

  2. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  3. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Version of Record online : 17 MAY 2012, DOI: 10.1002/sec.540

  4. A new certificateless authenticated key agreement protocol for SIP with different KGCs

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 631–643, Xiaowei Li, Yuqing Zhang and Geifei Zhang

    Version of Record online : 5 JUL 2012, DOI: 10.1002/sec.595

  5. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.566

  6. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.328

  7. New construction of affiliation-hiding authenticated group key agreement

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 723–734, Chang Xu, Hua Guo, Zhoujun Li and Yi Mu

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.606

  8. Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 612–630, Jingqiang Lin, Peng Liu, Jiwu Jing and Qiongxiao Wang

    Version of Record online : 13 NOV 2012, DOI: 10.1002/sec.593

  9. More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 173–181, Hongbing Wang and Zhenfu Cao

    Version of Record online : 5 JUN 2012, DOI: 10.1002/sec.552

  10. An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2527–2541, Chin-Ling Chen and Chun-Yi Wu

    Version of Record online : 7 OCT 2011, DOI: 10.1002/sec.383

  11. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1698–1716, Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827

  12. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Version of Record online : 17 DEC 2012, DOI: 10.1002/sec.650

  13. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.878

  14. Privacy enhancement for fair PayWord-based micropayment

    Security and Communication Networks

    Volume 9, Issue 5, 25 March 2016, Pages: 380–388, Chun-I Fan, Yu-Kuang Liang and Chien-Nan Wu

    Version of Record online : 28 NOV 2012, DOI: 10.1002/sec.672

  15. Client cloud Web service: reducing traffic consumption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 248–261, Jung Ha Paik, Kwantae Cho, Boo Geum Jung and Dong Hoon Lee

    Version of Record online : 5 JUN 2012, DOI: 10.1002/sec.544

  16. Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 764–775, Yuan Zhou and Haifeng Qian

    Version of Record online : 1 SEP 2011, DOI: 10.1002/sec.371

  17. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2507–2523, Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Version of Record online : 23 JAN 2015, DOI: 10.1002/sec.1192

  18. A short redactable signature scheme using pairing

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 523–534, Seongan Lim, Eunjeong Lee and Cheol-Min Park

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.346

  19. Balanced double subset difference broadcast encryption scheme

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1447–1460, Shyh-Yih Wang, Wu-Chuan Yang and Ying-Jen Lin

    Version of Record online : 5 AUG 2014, DOI: 10.1002/sec.1093

  20. A comprehensive analysis for fair probability marking based traceback approach in WSNs

    Security and Communication Networks

    Anfeng Liu, Xiao Liu and Yuxin Liu

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1515