Search Results

There are 3591 results for: content related to: Efficient and adaptively secure broadcast encryption systems

  1. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  2. A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 261–283, Mostafa Mohammadpourfard, Mohammad Ali Doostari, Mohammad Bagher Ghaznavi Ghoushchi and Nafiseh Shakiba

    Article first published online : 12 MAR 2014, DOI: 10.1002/sec.978

  3. Analysis on the generalization of proxy signature

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 549–566, Namita Tiwari and Sahadeo Padhye

    Article first published online : 27 JUN 2012, DOI: 10.1002/sec.581

  4. Evaluating and selecting the biometrics in network security

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 727–739, Che-Hung Liu, Jen-Sheng Wang, Chih-Chiang Peng and Joseph Z. Shyu

    Article first published online : 3 JUL 2014, DOI: 10.1002/sec.1020

  5. A two-factor authentication scheme with anonymity for multi-server environments

    Security and Communication Networks

    Chi-Tung Chen and Cheng-Chi Lee

    Article first published online : 5 SEP 2014, DOI: 10.1002/sec.1109

  6. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Article first published online : 18 MAY 2011, DOI: 10.1002/sec.328

  7. Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 612–630, Jingqiang Lin, Peng Liu, Jiwu Jing and Qiongxiao Wang

    Article first published online : 13 NOV 2012, DOI: 10.1002/sec.593

  8. Cipher feedback mode under go-back-N and selective-reject protocols in error channels

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 942–954, Xiannuan Liang, Yang Xiao, Suat Ozdemir, Athanasios V. Vasilakos and Hongmei Deng

    Article first published online : 12 OCT 2012, DOI: 10.1002/sec.638

  9. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  10. Context-aware usage control for web of things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2696–2712, Guangdong Bai, Lin Yan, Liang Gu, Yao Guo and Xiangqun Chen

    Article first published online : 15 FEB 2012, DOI: 10.1002/sec.424

  11. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Article first published online : 7 NOV 2013, DOI: 10.1002/sec.827

  12. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  13. Comparative study of trust and reputation systems for wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 669–688, Osman Khalid, Samee U. Khan, Sajjad A. Madani, Khizar Hayat, Majid I. Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally and Dan Chen

    Article first published online : 5 JUL 2012, DOI: 10.1002/sec.597

  14. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1192

  15. Trust computation for multiple routes recommendation in social network sites

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2258–2276, Bo Zhang, Zhenhua Huang, Jian Yu and Yang Xiang

    Article first published online : 10 JAN 2014, DOI: 10.1002/sec.935

  16. Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 764–775, Yuan Zhou and Haifeng Qian

    Article first published online : 1 SEP 2011, DOI: 10.1002/sec.371

  17. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Article first published online : 17 DEC 2012, DOI: 10.1002/sec.650

  18. Efficient authentication and access control of scalable multimedia streams over packet-lossy networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 611–625, Robert H. Deng, Xuhua Ding and Swee-Won Lo

    Article first published online : 21 MAR 2013, DOI: 10.1002/sec.762

  19. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Rajeev Singh and Teek Parval Sharma

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1079

  20. A flexible hierarchical access control mechanism enforcing extension policies

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 189–201, Ya-Fen Chang

    Article first published online : 4 MAR 2014, DOI: 10.1002/sec.971