Search Results

There are 1367 results for: content related to: New construction of affiliation-hiding authenticated group key agreement

  1. CSP-DHIES: a new public-key encryption scheme from matrix conjugation

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 809–822, Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li and Yixian Yang

    Article first published online : 3 OCT 2011, DOI: 10.1002/sec.376

  2. Certificateless online/offline signcryption scheme

    Security and Communication Networks

    Jiguo Li, Jingjing Zhao and Yichen Zhang

    Article first published online : 21 DEC 2014, DOI: 10.1002/sec.1146

  3. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Article first published online : 21 JUN 2012, DOI: 10.1002/sec.566

  4. Identity-based universal re-encryption for mixnets

    Security and Communication Networks

    Habib Allah Yajam, Javad Mohajeri and Mahmoud Salmasizadeh

    Article first published online : 18 FEB 2015, DOI: 10.1002/sec.1226

  5. A short redactable signature scheme using pairing

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 523–534, Seongan Lim, Eunjeong Lee and Cheol-Min Park

    Article first published online : 13 JUL 2011, DOI: 10.1002/sec.346

  6. Efficient and fault-diagnosable authentication architecture for AMI in smart grid

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 598–616, Depeng Li, Zeyar Aung, John R. Williams and Abel Sanchez

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1006

  7. Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 614–624, Fengrong Zhang, Yupu Hu, Min Xie and Yongzhuang Wei

    Article first published online : 16 AUG 2011, DOI: 10.1002/sec.356

  8. Remote three-factor authentication scheme based on Fuzzy extractors

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 682–693, Min Zhang, Jiashu Zhang and Ying Zhang

    Article first published online : 5 MAY 2014, DOI: 10.1002/sec.1016

  9. A UTP approach towards probabilistic protocol verification

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 99–107, Riccardo Bresciani and Andrew Butterfield

    Article first published online : 21 JUN 2012, DOI: 10.1002/sec.546

  10. Anonymous proxy re-encryption

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 439–449, Jun Shao, Peng Liu, Guiyi Wei and Yun Ling

    Article first published online : 4 MAY 2011, DOI: 10.1002/sec.326

  11. An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1921–1932, Saru Kumari, Mridul K. Gupta, Muhammad Khurram Khan and Xiong Li

    Article first published online : 13 NOV 2013, DOI: 10.1002/sec.906

  12. Provably secure revocable ID-based signature in the standard model

    Security and Communication Networks

    Volume 6, Issue 10, October 2013, Pages: 1250–1260, Tung-Tso Tsai, Yuh-Min Tseng and Tsu-Yang Wu

    Article first published online : 18 JAN 2013, DOI: 10.1002/sec.696

  13. An enhanced Kerberos protocol with non-interactive zero-knowledge proof

    Security and Communication Networks

    Yuesheng Zhu, Limin Ma and Jinjiang Zhang

    Article first published online : 19 JUN 2014, DOI: 10.1002/sec.1066

  14. A new intrusion detection method based on SVM with minimum within-class scatter

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1064–1074, Wenjuan An and Mangui Liang

    Article first published online : 18 DEC 2012, DOI: 10.1002/sec.666

  15. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Article first published online : 24 FEB 2012, DOI: 10.1002/sec.509

  16. Efficient homomorphic sealed-bid auction free of bid validity check and equality test

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 64–76, Kun Peng

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.549

  17. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Article first published online : 22 FEB 2012, DOI: 10.1002/sec.417

  18. An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2527–2541, Chin-Ling Chen and Chun-Yi Wu

    Article first published online : 7 OCT 2011, DOI: 10.1002/sec.383

  19. One-time identity–password authenticated key agreement scheme based on biometrics

    Security and Communication Networks

    Hongfeng Zhu

    Article first published online : 10 FEB 2015, DOI: 10.1002/sec.1182

  20. Security analysis of an ultra-lightweight RFID authentication protocol—SLMAP*

    Security and Communication Networks

    Volume 5, Issue 3, March 2012, Pages: 287–291, Imran Erguler, Cihan Unsal, Emin Anarim and Gokay Saldamli

    Article first published online : 30 MAY 2011, DOI: 10.1002/sec.347