Search Results

There are 3849 results for: content related to: SENSORLock: a lightweight key management scheme for wireless sensor networks

  1. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1752–1771, Santanu Chatterjee and Ashok Kumar Das

    Article first published online : 14 OCT 2014, DOI: 10.1002/sec.1140

  2. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Article first published online : 12 JAN 2015, DOI: 10.1002/sec.1164

  3. Analyses of several recently proposed group key management schemes

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 136–148, Niu Liu, Shaohua Tang, Lingling Xu and Daojing He

    Article first published online : 5 MAR 2014, DOI: 10.1002/sec.966

  4. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  5. Achieving dynamic privileges in secure data sharing on cloud storage

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2211–2224, Xingwen Zhao and Hui Li

    Article first published online : 14 MAR 2013, DOI: 10.1002/sec.739

  6. An anonymous and secure biometric-based enterprise digital rights management system for mobile environment

    Security and Communication Networks

    Ashok Kumar Das, Dheerendra Mishra and Sourav Mukhopadhyay

    Article first published online : 11 MAY 2015, DOI: 10.1002/sec.1266

  7. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1378–1407, Rajeev Singh and Teek Parval Sharma

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1079

  8. Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption

    Security and Communication Networks

    Y. Sreenivasa Rao and Ratna Dutta

    Article first published online : 26 AUG 2015, DOI: 10.1002/sec.1331

  9. Cipher feedback mode under go-back-N and selective-reject protocols in error channels

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 942–954, Xiannuan Liang, Yang Xiao, Suat Ozdemir, Athanasios V. Vasilakos and Hongmei Deng

    Article first published online : 12 OCT 2012, DOI: 10.1002/sec.638

  10. Role-based and time-bound access and management of EHR data

    Security and Communication Networks

    Volume 7, Issue 6, June 2014, Pages: 994–1015, Rui Zhang, Ling Liu and Rui Xue

    Article first published online : 21 JUN 2013, DOI: 10.1002/sec.817

  11. Efficient homomorphic sealed-bid auction free of bid validity check and equality test

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 64–76, Kun Peng

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.549

  12. CSP-DHIES: a new public-key encryption scheme from matrix conjugation

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 809–822, Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li and Yixian Yang

    Article first published online : 3 OCT 2011, DOI: 10.1002/sec.376

  13. DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1494–1508, Xiuxia Tian, Ling Huang, Yong Wang, Chaofeng Sha and Xiaoling Wang

    Article first published online : 9 SEP 2014, DOI: 10.1002/sec.1098

  14. On preserving user privacy in Smart Grid advanced metering infrastructure applications

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 206–220, Nico Saputro and Kemal Akkaya

    Article first published online : 18 JAN 2013, DOI: 10.1002/sec.706

  15. Energy efficiency of encryption schemes applied to wireless sensor networks

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 789–808, Xueying Zhang, Howard M. Heys and Cheng Li

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.375

  16. Ultra simple way to encrypt non-volatile main memory

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1155–1168, Fangyong Hou and Hongjun He

    Article first published online : 4 AUG 2014, DOI: 10.1002/sec.1071

  17. A two-factor authentication scheme with anonymity for multi-server environments

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1608–1625, Chi-Tung Chen and Cheng-Chi Lee

    Article first published online : 5 SEP 2014, DOI: 10.1002/sec.1109

  18. Protecting mobile agents communications in pervasive networks with a trusted distributed mediator for ID-based RSA

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1887–1899, L. Maccari, R. Fantacci, T. Pecorella, G. Ghettini and F. Chiti

    Article first published online : 18 NOV 2013, DOI: 10.1002/sec.903

  19. Privacy-preserving framework for geosocial applications

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1764–1779, Lukas Malina and Jan Hajny

    Article first published online : 31 AUG 2013, DOI: 10.1002/sec.873

  20. Efficient revocable certificateless public key encryption with a delegated revocation authority

    Security and Communication Networks

    Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang

    Article first published online : 15 JUN 2015, DOI: 10.1002/sec.1294