Search Results

There are 25441 results for: content related to: A simple and robust anonymous two-factor authenticated key exchange protocol

  1. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  2. On the monotonicity of some singular integral operators

    Mathematical Methods in the Applied Sciences

    Volume 35, Issue 8, 30 May 2012, Pages: 894–922, Peter Junghanns and Lothar von Wolfersdorf

    Version of Record online : 17 APR 2012, DOI: 10.1002/mma.1605

  3. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.566

  4. New construction of affiliation-hiding authenticated group key agreement

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 723–734, Chang Xu, Hua Guo, Zhoujun Li and Yi Mu

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.606

  5. Efficient encryption with keyword search in mobile networks

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1412–1422, Wei-Chuen Yau, Swee-Huay Heng, Syh-Yuan Tan, Bok-Min Goi and Raphael C.-W. Phan

    Version of Record online : 8 FEB 2012, DOI: 10.1002/sec.505

  6. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Version of Record online : 24 FEB 2012, DOI: 10.1002/sec.509

  7. Semiparametric transformation models for multiple continuous biomarkers in ROC analysis

    Biometrical Journal

    Volume 57, Issue 5, September 2015, Pages: 808–833, Eunhee Kim, Donglin Zeng and Xiao-Hua Zhou

    Version of Record online : 3 JUL 2015, DOI: 10.1002/bimj.201400043

  8. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 189–200, Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Version of Record online : 22 FEB 2012, DOI: 10.1002/sec.417

  9. New energy identities and super convergence analysis of the energy conserved splitting FDTD methods for 3D Maxwell's equations

    Mathematical Methods in the Applied Sciences

    Volume 36, Issue 4, 15 March 2013, Pages: 440–455, Liping Gao, Xingjie Li and Wenbin Chen

    Version of Record online : 22 JUN 2012, DOI: 10.1002/mma.2605

  10. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1698–1716, Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827

  11. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Version of Record online : 17 DEC 2012, DOI: 10.1002/sec.650

  12. Attribute-based ring signcryption scheme

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 790–796, Zhenzhou Guo, Mingchu Li and Xinxin Fan

    Version of Record online : 28 SEP 2012, DOI: 10.1002/sec.614

  13. A new certificateless authenticated key agreement protocol for SIP with different KGCs

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 631–643, Xiaowei Li, Yuqing Zhang and Geifei Zhang

    Version of Record online : 5 JUL 2012, DOI: 10.1002/sec.595

  14. A short redactable signature scheme using pairing

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 523–534, Seongan Lim, Eunjeong Lee and Cheol-Min Park

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.346

  15. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.328

  16. Known-plaintext attack on secure kNN computation on encrypted databases

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2432–2441, Gu Chunsheng and Gu Jixing

    Version of Record online : 17 JAN 2014, DOI: 10.1002/sec.954

  17. Identity-based optimistic fair exchange in the standard model

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 1010–1020, Lei Zhang, Qianhong Wu and Bo Qin

    Version of Record online : 26 NOV 2012, DOI: 10.1002/sec.652

  18. Efficient identity-based strong designated verifier signature schemes

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 902–911, Meijiao Duan, Jing Xu and Dengguo Feng

    Version of Record online : 26 NOV 2012, DOI: 10.1002/sec.645

  19. Efficient chosen ciphertext secure public-key encryption under factoring assumption

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 351–360, Baodong Qin and Shengli Liu

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.571

  20. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Version of Record online : 19 JUN 2012, DOI: 10.1002/sec.542