Search Results

There are 17176 results for: content related to: Comments on IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks

  1. Numerical study on flow and heat transfer of high-pressure syngas in membrane helical-coil heat exchanger

    Asia-Pacific Journal of Chemical Engineering

    Volume 7, Issue 6, November/December 2012, Pages: 848–855, Zhen Yang, Zhenxing Zhao, Yinhe Liu, Xiangyu Wang, Yongqiang Chang and Zidong Cao

    Article first published online : 18 NOV 2011, DOI: 10.1002/apj.649

  2. You have free access to this content
    Efficient homomorphic sealed-bid auction free of bid validity check and equality test

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 64–76, Kun Peng

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.549

  3. You have free access to this content
    A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  4. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540

  5. Poly(lactic acid)/low density polyethylene polymer blends: preparation and characterization

    Asia-Pacific Journal of Chemical Engineering

    Volume 7, Issue S3, August 2012, Pages: S310–S316, Kotiba Hamad, Mosab Kaseem and Fawaz Deri

    Article first published online : 24 JUL 2012, DOI: 10.1002/apj.1649

  6. Privacy and integrity preserving skyline queries in tiered sensor networks

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1177–1188, Jinguo Li, Yaping Lin, Gang Wang, Rui Li and Bo Yin

    Article first published online : 25 JUL 2013, DOI: 10.1002/sec.852

  7. CSP-DHIES: a new public-key encryption scheme from matrix conjugation

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 809–822, Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li and Yixian Yang

    Article first published online : 3 OCT 2011, DOI: 10.1002/sec.376

  8. Efficient and fault-diagnosable authentication architecture for AMI in smart grid

    Security and Communication Networks

    Depeng Li, Zeyar Aung, John R. Williams and Abel Sanchez

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1006

  9. Introducing proxy zero-knowledge proof and utilization in anonymous credential systems

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 161–172, Hoda Jannati, Mahmoud Salmasizadeh, Javad Mohajeri and Amir Moradi

    Article first published online : 18 APR 2012, DOI: 10.1002/sec.543

  10. Client cloud Web service: reducing traffic consumption

    Security and Communication Networks

    Jung Ha Paik, Kwantae Cho, Boo Geum Jung and Dong Hoon Lee

    Article first published online : 5 JUN 2012, DOI: 10.1002/sec.544

  11. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  12. Design of secure access control scheme for personal health record-based cloud healthcare service

    Security and Communication Networks

    Chia-Hui Liu, Fong-Qi Lin, Chin-Sheng Chen and Tzer-Shyong Chen

    Article first published online : 8 AUG 2014, DOI: 10.1002/sec.1087

  13. Trust computation for multiple routes recommendation in social network sites

    Security and Communication Networks

    Bo Zhang, Zhenhua Huang, Jian Yu and Yang Xiang

    Article first published online : 10 JAN 2014, DOI: 10.1002/sec.935

  14. Balanced double subset difference broadcast encryption scheme

    Security and Communication Networks

    Shyh-Yih Wang, Wu-Chuan Yang and Ying-Jen Lin

    Article first published online : 5 AUG 2014, DOI: 10.1002/sec.1093

  15. On downlink power allocation for multiuser variable-bit-rate video streaming

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 485–497, Yingsong Huang, Shiwen Mao and Yihan Li

    Article first published online : 9 NOV 2012, DOI: 10.1002/sec.642

  16. Protocol Derivation System for the Needham–Schroeder family

    Security and Communication Networks

    Junwei Zhang, Jianfeng Ma and Chao Yang

    Article first published online : 25 JUN 2012, DOI: 10.1002/sec.565

  17. TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 245–264, Mehran S. Fallah and Nafiseh Kahani

    Article first published online : 14 FEB 2013, DOI: 10.1002/sec.725

  18. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  19. Efficient authentication and access control of scalable multimedia streams over packet-lossy networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 611–625, Robert H. Deng, Xuhua Ding and Swee-Won Lo

    Article first published online : 21 MAR 2013, DOI: 10.1002/sec.762

  20. Secure group and multi-layer group communication schemes based on polynomial interpolation

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 735–756, Purushothama B. R. and B. B. Amberker

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.607