Search Results

There are 15628 results for: content related to: Provably secure revocable ID-based signature in the standard model

  1. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540

  2. Known-plaintext attack on secure kNN computation on encrypted databases

    Security and Communication Networks

    Gu Chunsheng and Gu Jixing

    Article first published online : 17 JAN 2014, DOI: 10.1002/sec.954

  3. Threshold visual secret sharing based on Boolean operations

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 653–664, Sachin Kumar and Rajendra K. Sharma

    Article first published online : 17 MAY 2013, DOI: 10.1002/sec.769

  4. Protocol Derivation System for the Needham–Schroeder family

    Security and Communication Networks

    Junwei Zhang, Jianfeng Ma and Chao Yang

    Article first published online : 25 JUN 2012, DOI: 10.1002/sec.565

  5. Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 614–624, Fengrong Zhang, Yupu Hu, Min Xie and Yongzhuang Wei

    Article first published online : 16 AUG 2011, DOI: 10.1002/sec.356

  6. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Article first published online : 21 JUN 2012, DOI: 10.1002/sec.566

  7. Efficient identity-based strong designated verifier signature schemes

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 902–911, Meijiao Duan, Jing Xu and Dengguo Feng

    Article first published online : 26 NOV 2012, DOI: 10.1002/sec.645

  8. Key exposure free chameleon hash schemes based on discrete logarithm problem

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 812–817, Seongan Lim, Juhee Lee and Youngjoo An

    Article first published online : 13 AUG 2012, DOI: 10.1002/sec.612

  9. You have free access to this content
    Algebraic construction of cryptographically good binary linear transformations

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 53–63, Bora Aslan and Muharrem Tolga Sakallı

    Article first published online : 9 MAY 2012, DOI: 10.1002/sec.556

  10. You have free access to this content
    Efficient homomorphic sealed-bid auction free of bid validity check and equality test

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 64–76, Kun Peng

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.549

  11. New public key cryptosystems based on non-Abelian factorization problems

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 912–922, Lize Gu, Licheng Wang, Kaoru Ota, Mianxiong Dong, Zhenfu Cao and Yixian Yang

    Article first published online : 1 MAR 2013, DOI: 10.1002/sec.710

  12. Achieving dynamic privileges in secure data sharing on cloud storage

    Security and Communication Networks

    Xingwen Zhao and Hui Li

    Article first published online : 14 MAR 2013, DOI: 10.1002/sec.739

  13. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Article first published online : 22 FEB 2012, DOI: 10.1002/sec.417

  14. CSP-DHIES: a new public-key encryption scheme from matrix conjugation

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 809–822, Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li and Yixian Yang

    Article first published online : 3 OCT 2011, DOI: 10.1002/sec.376

  15. Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 764–775, Yuan Zhou and Haifeng Qian

    Article first published online : 1 SEP 2011, DOI: 10.1002/sec.371

  16. Identity-based construction for secure and efficient handoff authentication schemes in wireless networks

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1121–1130, Y. H. Zhang, X. F. Chen, H. Li and J. Cao

    Article first published online : 6 FEB 2012, DOI: 10.1002/sec.421

  17. Anonymous password-based key exchange with low resources consumption and better user-friendliness

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1379–1393, Haifeng Qian, Junqing Gong and Yuan Zhou

    Article first published online : 8 FEB 2012, DOI: 10.1002/sec.501

  18. Cipher feedback mode under go-back-N and selective-reject protocols in error channels

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 942–954, Xiannuan Liang, Yang Xiao, Suat Ozdemir, Athanasios V. Vasilakos and Hongmei Deng

    Article first published online : 12 OCT 2012, DOI: 10.1002/sec.638

  19. A finite equivalence of multisecret sharing based on Lagrange interpolating polynomial

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1169–1175, Hui Zhao, Jonathan Z. Sun, Fengying Wang and Lei Zhao

    Article first published online : 24 JAN 2013, DOI: 10.1002/sec.694

  20. An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards

    Security and Communication Networks

    Chin-Ling Chen and Chun-Yi Wu

    Article first published online : 7 OCT 2011, DOI: 10.1002/sec.383