Search Results

There are 3312 results for: content related to: A reversible watermark scheme for 2D vector map based on reversible contrast mapping

  1. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  2. Efficient oblivious transfer with adaptive queries in UC framework

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2592–2611, Vandana Guleria and Ratna Dutta

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1505

  3. Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1843–1863, Yanfei Guo and Zhenfeng Zhang

    Version of Record online : 27 AUG 2013, DOI: 10.1002/sec.868

  4. Towards fair mutual private set intersection with linear complexity

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1589–1612, Sumit Kumar Debnath and Ratna Dutta

    Version of Record online : 6 MAR 2016, DOI: 10.1002/sec.1450

  5. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3356–3371, Zheng Yang, Wu Yang, Lingyun Zhu and Daigu Zhang

    Version of Record online : 19 MAY 2015, DOI: 10.1002/sec.1263

  6. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Version of Record online : 1 JUN 2015, DOI: 10.1002/sec.1285

  7. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  8. Efficient certificate-based encryption schemes without pairing

    Security and Communication Networks

    Minh-Ha Le, Intae Kim and Seong Oun Hwang

    Version of Record online : 8 DEC 2016, DOI: 10.1002/sec.1703

  9. Active jamming for multi-user information security improvement with the access statuses of users

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3893–3910, Datong Xu, Pinyi Ren, Qinghe Du and Li Sun

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1592

  10. Hierarchical attribute-based encryption with continuous auxiliary inputs leakage

    Security and Communication Networks

    Yuyan Guo, Jiguo Li, Yichen Zhang and Jian Shen

    Version of Record online : 15 DEC 2016, DOI: 10.1002/sec.1659

  11. Security analysis and design of an efficient ECC-based two-factor password authentication scheme

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4166–4181, Tanmoy Maitra, Mohammad S. Obaidat, SK Hafizul Islam, Debasis Giri and Ruhul Amin

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1596

  12. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2070–2092, Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and Xiong Li

    Version of Record online : 23 FEB 2016, DOI: 10.1002/sec.1464

  13. Anonymous attribute-based proxy re-encryption for access control in cloud computing

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2397–2411, Yinghui Zhang, Jin Li, Xiaofeng Chen and Hui Li

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1509

  14. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.566

  15. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.328

  16. Dual cooperative RFID-telecare medicine information system authentication protocol for healthcare environments

    Security and Communication Networks

    Mustapha Benssalah, Mustapha Djeddou and Karim Drouiche

    Version of Record online : 8 NOV 2016, DOI: 10.1002/sec.1665

  17. Provably secure user authentication and key agreement scheme for wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3670–3687, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu and Xinyi Huang

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1573

  18. Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 1983–2001, Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li and Fan Wu

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1452

  19. Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4060–4074, Arijit Karati and G. P. Biswas

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1588

  20. Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4157–4176, Y. Sreenivasa Rao and Ratna Dutta

    Version of Record online : 26 AUG 2015, DOI: 10.1002/sec.1331