Search Results

There are 3351 results for: content related to: Analysis on the generalization of proxy signature

  1. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  2. Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 69–77, Zhenhua Liu, Yupu Hu, Xiangsong Zhang and Fagen Li

    Version of Record online : 7 MAR 2012, DOI: 10.1002/sec.531

  3. Efficient chosen ciphertext secure public-key encryption under factoring assumption

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 351–360, Baodong Qin and Shengli Liu

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.571

  4. Efficient pairing-free provably secure identity-based proxy blind signature scheme

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 593–601, Zuowen Tan

    Version of Record online : 25 JUN 2012, DOI: 10.1002/sec.582

  5. Anonymous password-based key exchange with low resources consumption and better user-friendliness

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1379–1393, Haifeng Qian, Junqing Gong and Yuan Zhou

    Version of Record online : 8 FEB 2012, DOI: 10.1002/sec.501

  6. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1698–1716, Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827

  7. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Version of Record online : 17 DEC 2012, DOI: 10.1002/sec.650

  8. Intelligent network security assessment with modeling and analysis of attack patterns

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1471–1486, Suleyman Kondakci

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.591

  9. A privacy-preserving acceleration authentication protocol for mobile pay-TV systems

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 361–372, Xuefeng Liu and Yuqing Zhang

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.584

  10. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.566

  11. Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 764–775, Yuan Zhou and Haifeng Qian

    Version of Record online : 1 SEP 2011, DOI: 10.1002/sec.371

  12. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.328

  13. New construction of affiliation-hiding authenticated group key agreement

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 723–734, Chang Xu, Hua Guo, Zhoujun Li and Yi Mu

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.606

  14. A flexible hierarchical access control mechanism enforcing extension policies

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 189–201, Ya-Fen Chang

    Version of Record online : 4 MAR 2014, DOI: 10.1002/sec.971

  15. Enhancement on strongly secure group key agreement

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 126–135, Yuh-Min Tseng, Tung-Tso Tsai and Sen-Shan Huang

    Version of Record online : 19 FEB 2014, DOI: 10.1002/sec.964

  16. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Version of Record online : 19 JUN 2012, DOI: 10.1002/sec.542

  17. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1016–1024, Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu and Yichen Zhang

    Version of Record online : 18 DEC 2015, DOI: 10.1002/sec.1396

  18. A post-quantum provable data possession protocol in cloud

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 658–667, Liang Chen, Lansheng Han, Jiandu Jing and Dongping Hu

    Version of Record online : 22 FEB 2013, DOI: 10.1002/sec.691

  19. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Version of Record online : 24 FEB 2012, DOI: 10.1002/sec.509

  20. Efficient homomorphic sealed-bid auction free of bid validity check and equality test

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 64–76, Kun Peng

    Version of Record online : 17 MAY 2012, DOI: 10.1002/sec.549