Search Results

There are 2022 results for: content related to: Secure SIP authentication scheme supporting lawful interception

  1. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  2. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Article first published online : 21 JUN 2012, DOI: 10.1002/sec.566

  3. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Article first published online : 22 FEB 2012, DOI: 10.1002/sec.417

  4. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Article first published online : 7 NOV 2013, DOI: 10.1002/sec.827

  5. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Article first published online : 17 DEC 2012, DOI: 10.1002/sec.650

  6. A new certificateless authenticated key agreement protocol for SIP with different KGCs

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 631–643, Xiaowei Li, Yuqing Zhang and Geifei Zhang

    Article first published online : 5 JUL 2012, DOI: 10.1002/sec.595

  7. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Article first published online : 18 MAY 2011, DOI: 10.1002/sec.328

  8. New construction of affiliation-hiding authenticated group key agreement

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 723–734, Chang Xu, Hua Guo, Zhoujun Li and Yi Mu

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.606

  9. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  10. Secure identity-based multisignature schemes under quadratic residue assumptions

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 689–701, Lifei Wei, Zhenfu Cao and Xiaolei Dong

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.600

  11. More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 173–181, Hongbing Wang and Zhenfu Cao

    Article first published online : 5 JUN 2012, DOI: 10.1002/sec.552

  12. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Article first published online : 24 FEB 2012, DOI: 10.1002/sec.509

  13. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  14. Attribute-based ring signcryption scheme

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 790–796, Zhenzhou Guo, Mingchu Li and Xinxin Fan

    Article first published online : 28 SEP 2012, DOI: 10.1002/sec.614

  15. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1192

  16. A short redactable signature scheme using pairing

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 523–534, Seongan Lim, Eunjeong Lee and Cheol-Min Park

    Article first published online : 13 JUL 2011, DOI: 10.1002/sec.346

  17. Known-plaintext attack on secure kNN computation on encrypted databases

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2432–2441, Gu Chunsheng and Gu Jixing

    Article first published online : 17 JAN 2014, DOI: 10.1002/sec.954

  18. Enhancement on strongly secure group key agreement

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 126–135, Yuh-Min Tseng, Tung-Tso Tsai and Sen-Shan Huang

    Article first published online : 19 FEB 2014, DOI: 10.1002/sec.964

  19. Fast authentication mechanism with provable correctness for cluster-based VANETs

    Security and Communication Networks

    Volume 7, Issue 6, June 2014, Pages: 1016–1030, Jung-San Lee and Ya-Chieh Huang

    Article first published online : 14 JUN 2013, DOI: 10.1002/sec.818

  20. Identity-based optimistic fair exchange in the standard model

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 1010–1020, Lei Zhang, Qianhong Wu and Bo Qin

    Article first published online : 26 NOV 2012, DOI: 10.1002/sec.652