Search Results

There are 13631 results for: content related to: Comments on IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks

  1. Generating certification authority authenticated public keys in ad hoc networks

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 87–106, G. Kounga, C. J. Mitchell and T. Walter

    Version of Record online : 13 DEC 2010, DOI: 10.1002/sec.279

  2. Certificateless online/offline signcryption scheme

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 1979–1990, Jiguo Li, Jingjing Zhao and Yichen Zhang

    Version of Record online : 21 DEC 2014, DOI: 10.1002/sec.1146

  3. Edge Weighting Functions on Dominating Sets

    Journal of Graph Theory

    Volume 72, Issue 3, March 2013, Pages: 346–360, Justin Southey and Michael A. Henning

    Version of Record online : 20 JUN 2012, DOI: 10.1002/jgt.21649

  4. On robust key agreement based on public key authentication

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 77–87, Feng Hao

    Version of Record online : 18 APR 2012, DOI: 10.1002/sec.550

  5. Certificateless broadcast authentication for vehicular ad hoc networks

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 602–611, Eun-Kyung Ryu and Kee-Young Yoo

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.590

  6. Certificateless aggregate signature with efficient verification

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2232–2243, Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang and Gwoboa Horng

    Version of Record online : 13 NOV 2014, DOI: 10.1002/sec.1166

  7. Enhancement on strongly secure group key agreement

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 126–135, Yuh-Min Tseng, Tung-Tso Tsai and Sen-Shan Huang

    Version of Record online : 19 FEB 2014, DOI: 10.1002/sec.964

  8. Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2214–2231, SK Hafizul Islam, Muhammad Khurram Khan and Ali M. Al-Khouri

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1165

  9. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3282–3299, Jin Cao, Maode Ma and Hui Li

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1252

  10. SET for E-Commerce Transactions

    Wireless Mobile Internet Security, Second Edition

    Man Young Rhee, Pages: 415–438, 2013

    Published Online : 25 MAR 2013, DOI: 10.1002/9781118512920.ch12

  11. Efficient revocable identity-based encryption from multilinear maps

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3511–3522, Xianping Mao, Junzuo Lai, Kefei Chen, Jian Weng and Qixiang Mei

    Version of Record online : 11 MAY 2015, DOI: 10.1002/sec.1274

  12. Secure broadcast in distributed networks with strong adversaries

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3739–3750, Pawel Szalachowski and Tiffany Hyun-Jin Kim

    Version of Record online : 14 JUL 2015, DOI: 10.1002/sec.1296

  13. Detecting Association of Rare and Common Variants by Testing an Optimally Weighted Combination of Variants

    Genetic Epidemiology

    Volume 36, Issue 6, September 2012, Pages: 561–571, Qiuying Sha, Xuexia Wang, Xinli Wang and Shuanglin Zhang

    Version of Record online : 19 JUN 2012, DOI: 10.1002/gepi.21649

  14. Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.940

  15. A data privacy protective mechanism for wireless body area networks

    Wireless Communications and Mobile Computing

    GuangXia Xu, Qun Wu, Mahmoud Daneshmand, Yanbing Liu and ManMan Wang

    Version of Record online : 24 NOV 2015, DOI: 10.1002/wcm.2649

  16. Elastic constants of lamellar and interlamellar regions in α and mesomorphic isotactic polypropylene by AFM indentation

    Journal of Applied Polymer Science

    Volume 133, Issue 27, July 15, 2016, R. C. Picu and A. R. Osta

    Version of Record online : 4 APR 2016, DOI: 10.1002/app.43649

  17. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  18. Signer-admissible strong designated verifier signature from bilinear pairings

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 422–428, Huaqun Wang

    Version of Record online : 14 JUN 2013, DOI: 10.1002/sec.805

  19. Global well-posedness result for density-dependent incompressible viscous fluid in R2 with linearly growing initial velocity

    Mathematical Methods in the Applied Sciences

    Volume 36, Issue 8, 30 May 2013, Pages: 921–935, Daoyuan Fang, Bin Han and Ting Zhang

    Version of Record online : 16 JUL 2012, DOI: 10.1002/mma.2649

  20. Certificateless and certificate-based signatures from lattices

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1575–1586, Miaomiao Tian and Liusheng Huang

    Version of Record online : 27 OCT 2014, DOI: 10.1002/sec.1105