Search Results

There are 3692 results for: content related to: Certificateless broadcast authentication for vehicular ad hoc networks

  1. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  2. A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 588–601, Amizah Malip, Siaw-Lynn Ng and Qin Li

    Article first published online : 21 MAR 2013, DOI: 10.1002/sec.760

  3. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Article first published online : 17 DEC 2012, DOI: 10.1002/sec.650

  4. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 27 AUG 2015, DOI: 10.1002/sec.1330

  5. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  6. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  7. Performance comparison between IBE-HWMP and ECDSA-HWMP

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 437–449, Yesica Imelda Saavedra Benitez, Jalel Ben-othman and Jean-Pierre Claude

    Article first published online : 28 FEB 2013, DOI: 10.1002/sec.632

  8. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540

  9. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1192

  10. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Article first published online : 18 MAY 2011, DOI: 10.1002/sec.328

  11. Privacy-preserving framework for geosocial applications

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1764–1779, Lukas Malina and Jan Hajny

    Article first published online : 31 AUG 2013, DOI: 10.1002/sec.873

  12. Enhanced authentication for commercial video services

    Security and Communication Networks

    Volume 5, Issue 11, November 2012, Pages: 1248–1259, Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou and Robert H. Deng

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.620

  13. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1752–1771, Santanu Chatterjee and Ashok Kumar Das

    Article first published online : 14 OCT 2014, DOI: 10.1002/sec.1140

  14. New public key cryptosystems based on non-Abelian factorization problems

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 912–922, Lize Gu, Licheng Wang, Kaoru Ota, Mianxiong Dong, Zhenfu Cao and Yixian Yang

    Article first published online : 1 MAR 2013, DOI: 10.1002/sec.710

  15. Secure identity-based multisignature schemes under quadratic residue assumptions

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 689–701, Lifei Wei, Zhenfu Cao and Xiaolei Dong

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.600

  16. Analysis on the generalization of proxy signature

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 549–566, Namita Tiwari and Sahadeo Padhye

    Article first published online : 27 JUN 2012, DOI: 10.1002/sec.581

  17. Context-aware usage control for web of things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2696–2712, Guangdong Bai, Lin Yan, Liang Gu, Yao Guo and Xiangqun Chen

    Article first published online : 15 FEB 2012, DOI: 10.1002/sec.424

  18. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Jin Cao, Maode Ma and Hui Li

    Article first published online : 22 APR 2015, DOI: 10.1002/sec.1252

  19. New method of key-dependent message security for asymmetric encryption

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2157–2170, Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang and Fenghe Wang

    Article first published online : 14 NOV 2014, DOI: 10.1002/sec.1160

  20. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Article first published online : 22 FEB 2012, DOI: 10.1002/sec.417