Search Results

There are 21892 results for: content related to: Free global ID against collusion attack on multi-authority attribute-based encryption

  1. Rejection of unknown periodic disturbances for continuous-time MIMO systems with dynamic uncertainties

    International Journal of Adaptive Control and Signal Processing

    Volume 30, Issue 12, December 2016, Pages: 1674–1688, Saeid Jafari and Petros A. Ioannou

    Version of Record online : 29 MAR 2016, DOI: 10.1002/acs.2683

  2. Acyclic Chromatic Indices of Planar Graphs with Girth At Least 4

    Journal of Graph Theory

    Volume 73, Issue 4, August 2013, Pages: 386–399, Qiaojun Shu, Weifan Wang and Yiqiao Wang

    Version of Record online : 11 JUL 2012, DOI: 10.1002/jgt.21683

  3. Branch-and-price-and-cut for the manpower routing problem with synchronization constraints

    Naval Research Logistics (NRL)

    Volume 63, Issue 2, March 2016, Pages: 138–171, Zhixing Luo, Hu Qin, Wenbin Zhu and Andrew Lim

    Version of Record online : 31 MAR 2016, DOI: 10.1002/nav.21683

  4. An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2527–2541, Chin-Ling Chen and Chun-Yi Wu

    Version of Record online : 7 OCT 2011, DOI: 10.1002/sec.383

  5. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  6. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.566

  7. Power allocation design and optimization for secure transmission in cognitive relay networks

    Security and Communication Networks

    Pei Zhang, Yi-Liang Liu, Jian-ming Zhang and Liang-min Wang

    Version of Record online : 21 NOV 2016, DOI: 10.1002/sec.1683

  8. Locating depots for capacitated vehicle routing

    Networks

    Volume 68, Issue 2, September 2016, Pages: 94–103, Inge Li Gørtz and Viswanath Nagarajan

    Version of Record online : 20 JUN 2016, DOI: 10.1002/net.21683

  9. Finite horizon H control for a class of sampled-data linear quantum systems

    International Journal of Robust and Nonlinear Control

    Aline I. Maalouf and Ian R. Petersen

    Version of Record online : 6 OCT 2016, DOI: 10.1002/rnc.3683

  10. Practical identity-based encryption in multiple private key generator (PKG) environments

    Security and Communication Networks

    Volume 8, Issue 1, 10 January 2015, Pages: 43–50, Shengbao Wang, Zhenfu Cao, Qi Xie and Wenhao Liu

    Version of Record online : 18 MAR 2013, DOI: 10.1002/sec.743

  11. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 189–200, Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Version of Record online : 22 FEB 2012, DOI: 10.1002/sec.417

  12. Economic model predictive control of nonlinear process systems using empirical models

    AIChE Journal

    Volume 61, Issue 3, March 2015, Pages: 816–830, Anas Alanqar, Matthew Ellis and Panagiotis D. Christofides

    Version of Record online : 28 NOV 2014, DOI: 10.1002/aic.14683

  13. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1698–1716, Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827

  14. Bayesian model selection in logistic regression for the detection of adverse drug reactions

    Biometrical Journal

    Volume 58, Issue 6, November 2016, Pages: 1376–1389, Matthieu Marbac, Pascale Tubert-Bitter and Mohammed Sedki

    Version of Record online : 25 MAY 2016, DOI: 10.1002/bimj.201500098

  15. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.328

  16. A Human–Computer Cooperation Fuzzy c-Means Clustering with Interval-Valued Weights

    International Journal of Intelligent Systems

    Volume 30, Issue 2, February 2015, Pages: 81–98, Wei Lu, Liyong Zhang, Xiaodong Liu, Jianhua Yang and Witold Pedrycz

    Version of Record online : 29 SEP 2014, DOI: 10.1002/int.21683

  17. New construction of affiliation-hiding authenticated group key agreement

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 723–734, Chang Xu, Hua Guo, Zhoujun Li and Yi Mu

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.606

  18. Empirical Bayes Correction for the Winner's Curse in Genetic Association Studies

    Genetic Epidemiology

    Volume 37, Issue 1, January 2013, Pages: 60–68, John P. Ferguson, Judy H. Cho, Can Yang and Hongyu Zhao

    Version of Record online : 25 SEP 2012, DOI: 10.1002/gepi.21683

  19. DNA cyclization and looping in the wormlike limit: Normal modes and the validity of the harmonic approximation

    Biopolymers

    Volume 103, Issue 9, September 2015, Pages: 528–538, Stefan M. Giovan, Andreas Hanke and Stephen D. Levene

    Version of Record online : 26 JUN 2015, DOI: 10.1002/bip.22683

  20. Efficient chosen ciphertext secure public-key encryption under factoring assumption

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 351–360, Baodong Qin and Shengli Liu

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.571