Search Results

There are 33794 results for: content related to: Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing

  1. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Article first published online : 7 NOV 2013, DOI: 10.1002/sec.827

  2. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  3. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Article first published online : 24 FEB 2012, DOI: 10.1002/sec.509

  4. Efficient homomorphic sealed-bid auction free of bid validity check and equality test

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 64–76, Kun Peng

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.549

  5. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Article first published online : 22 FEB 2012, DOI: 10.1002/sec.417

  6. An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2527–2541, Chin-Ling Chen and Chun-Yi Wu

    Article first published online : 7 OCT 2011, DOI: 10.1002/sec.383

  7. One-time identity–password authenticated key agreement scheme based on biometrics

    Security and Communication Networks

    Hongfeng Zhu

    Article first published online : 10 FEB 2015, DOI: 10.1002/sec.1182

  8. CSP-DHIES: a new public-key encryption scheme from matrix conjugation

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 809–822, Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li and Yixian Yang

    Article first published online : 3 OCT 2011, DOI: 10.1002/sec.376

  9. Security analysis of an ultra-lightweight RFID authentication protocol—SLMAP*

    Security and Communication Networks

    Volume 5, Issue 3, March 2012, Pages: 287–291, Imran Erguler, Cihan Unsal, Emin Anarim and Gokay Saldamli

    Article first published online : 30 MAY 2011, DOI: 10.1002/sec.347

  10. Certificateless online/offline signcryption scheme

    Security and Communication Networks

    Jiguo Li, Jingjing Zhao and Yichen Zhang

    Article first published online : 21 DEC 2014, DOI: 10.1002/sec.1146

  11. Correlation power analysis of Trivium

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 479–484, Yanyan Jia, Yupu Hu, Fenghe Wang and Hongxian Wang

    Article first published online : 27 APR 2011, DOI: 10.1002/sec.329

  12. Design of secure access control scheme for personal health record-based cloud healthcare service

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1332–1346, Chia-Hui Liu, Fong-Qi Lin, Chin-Sheng Chen and Tzer-Shyong Chen

    Article first published online : 8 AUG 2014, DOI: 10.1002/sec.1087

  13. Privacy and integrity preserving skyline queries in tiered sensor networks

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1177–1188, Jinguo Li, Yaping Lin, Gang Wang, Rui Li and Bo Yin

    Article first published online : 25 JUL 2013, DOI: 10.1002/sec.852

  14. A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 588–601, Amizah Malip, Siaw-Lynn Ng and Qin Li

    Article first published online : 21 MAR 2013, DOI: 10.1002/sec.760

  15. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Article first published online : 17 DEC 2012, DOI: 10.1002/sec.650

  16. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  17. Privacy enhancement for fair PayWord-based micropayment

    Security and Communication Networks

    Chun-I Fan, Yu-Kuang Liang and Chien-Nan Wu

    Article first published online : 28 NOV 2012, DOI: 10.1002/sec.672

  18. Efficient three-party encrypted key exchange using trapdoor functions

    Security and Communication Networks

    Volume 6, Issue 11, November 2013, Pages: 1353–1358, Tian-Fu Lee, I-Pin Chang and Ching-Cheng Wang

    Article first published online : 28 FEB 2013, DOI: 10.1002/sec.717

  19. Free global ID against collusion attack on multi-authority attribute-based encryption

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1143–1152, Ang Gao and Zengzhi Li

    Article first published online : 15 FEB 2013, DOI: 10.1002/sec.683

  20. Attribute-based ring signcryption scheme

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 790–796, Zhenzhou Guo, Mingchu Li and Xinxin Fan

    Article first published online : 28 SEP 2012, DOI: 10.1002/sec.614