Search Results

There are 3398 results for: content related to: Cipher feedback mode under go-back-N and selective-reject protocols in error channels

  1. You have full text access to this Open Access content
    Active jamming for multi-user information security improvement with the access statuses of users

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3893–3910, Datong Xu, Pinyi Ren, Qinghe Du and Li Sun

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1592

  2. You have full text access to this Open Access content
    New construction of affiliation-hiding authenticated group key agreement

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 723–734, Chang Xu, Hua Guo, Zhoujun Li and Yi Mu

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.606

  3. You have full text access to this Open Access content
    Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Version of Record online : 17 DEC 2012, DOI: 10.1002/sec.650

  4. You have full text access to this Open Access content
    Privacy enhancement for fair PayWord-based micropayment

    Security and Communication Networks

    Volume 9, Issue 5, 25 March 2016, Pages: 380–388, Chun-I Fan, Yu-Kuang Liang and Chien-Nan Wu

    Version of Record online : 28 NOV 2012, DOI: 10.1002/sec.672

  5. You have full text access to this Open Access content
    Free global ID against collusion attack on multi-authority attribute-based encryption

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1143–1152, Ang Gao and Zengzhi Li

    Version of Record online : 15 FEB 2013, DOI: 10.1002/sec.683

  6. You have full text access to this Open Access content
    Attribute-based ring signcryption scheme

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 790–796, Zhenzhou Guo, Mingchu Li and Xinxin Fan

    Version of Record online : 28 SEP 2012, DOI: 10.1002/sec.614

  7. You have full text access to this Open Access content
    Secure group and multi-layer group communication schemes based on polynomial interpolation

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 735–756, Purushothama B. R. and B. B. Amberker

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.607

  8. You have full text access to this Open Access content
    A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 972–984, Chin-Chen Chang, Shih-Chang Chang and Jen-Ho Yang

    Version of Record online : 28 SEP 2012, DOI: 10.1002/sec.647

  9. You have full text access to this Open Access content
    Enhanced authentication for commercial video services

    Security and Communication Networks

    Volume 5, Issue 11, November 2012, Pages: 1248–1259, Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou and Robert H. Deng

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.620

  10. You have full text access to this Open Access content
    On downlink power allocation for multiuser variable-bit-rate video streaming

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 485–497, Yingsong Huang, Shiwen Mao and Yihan Li

    Version of Record online : 9 NOV 2012, DOI: 10.1002/sec.642

  11. Electrorheological Fluids

    Standard Article

    Encyclopedia of Smart Materials

    Tian Hao

    Published Online : 15 JUL 2002, DOI: 10.1002/0471216275.esm035

  12. You have full text access to this Open Access content
    Identity-based optimistic fair exchange in the standard model

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 1010–1020, Lei Zhang, Qianhong Wu and Bo Qin

    Version of Record online : 26 NOV 2012, DOI: 10.1002/sec.652

  13. You have full text access to this Open Access content
    A simple and robust anonymous two-factor authenticated key exchange protocol

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 711–722, Xiaowei Li and Yuqing Zhang

    Version of Record online : 13 AUG 2012, DOI: 10.1002/sec.605

  14. You have full text access to this Open Access content
    Efficient identity-based strong designated verifier signature schemes

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 902–911, Meijiao Duan, Jing Xu and Dengguo Feng

    Version of Record online : 26 NOV 2012, DOI: 10.1002/sec.645

  15. You have full text access to this Open Access content
    Nonintrusive tracing in the Internet

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 833–843, Alina Olteanu, Yang Xiao, Jing Liu, Thomas M. Chen and C. L. Philip Chen

    Version of Record online : 25 SEP 2012, DOI: 10.1002/sec.616

  16. You have full text access to this Open Access content
    Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 881–888, Wei Yuan, Liang Hu, Hongtu Li and Jianfeng Chu

    Version of Record online : 15 NOV 2012, DOI: 10.1002/sec.627

  17. You have full text access to this Open Access content
    Efficient and adaptively secure broadcast encryption systems

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 1044–1052, Mingwu Zhang, Bo Yang, Zhenhua Chen and Tsuyoshi Takagi

    Version of Record online : 12 NOV 2012, DOI: 10.1002/sec.678

  18. You have full text access to this Open Access content
    Secure identity-based multisignature schemes under quadratic residue assumptions

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 689–701, Lifei Wei, Zhenfu Cao and Xiaolei Dong

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.600

  19. You have full text access to this Open Access content
    A post-quantum provable data possession protocol in cloud

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 658–667, Liang Chen, Lansheng Han, Jiandu Jing and Dongping Hu

    Version of Record online : 22 FEB 2013, DOI: 10.1002/sec.691

  20. You have full text access to this Open Access content
    A communication and computation-efficient three-party authenticated key agreement protocol

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 854–863, Zuowen Tan

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.622