Search Results

There are 17637 results for: content related to: New public key cryptosystems based on non-Abelian factorization problems

  1. PFX: an essence of authencryption for block-cipher security

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1186–1197, Tzonelih Hwang and Prosanta Gope

    Version of Record online : 11 JAN 2016, DOI: 10.1002/sec.1410

  2. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  3. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Version of Record online : 24 FEB 2012, DOI: 10.1002/sec.509

  4. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 189–200, Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Version of Record online : 22 FEB 2012, DOI: 10.1002/sec.417

  5. Study on the flow structure and its effects on the interaction and formation of cryogenic taylor bubbles by PIV technique and POD analysis

    The Canadian Journal of Chemical Engineering

    Volume 92, Issue 2, February 2014, Pages: 374–389, Yi-Peng Liu, Ping-Yang Wang, Xian-Lin Zhao and Zhao-Hui Du

    Version of Record online : 26 MAR 2013, DOI: 10.1002/cjce.21810

  6. New construction of affiliation-hiding authenticated group key agreement

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 723–734, Chang Xu, Hua Guo, Zhoujun Li and Yi Mu

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.606

  7. Robust off-line e-cash scheme with recoverability and anonymity revocation

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2412–2421, Feng Wang, Chin-Chen Chang and Shih-Chang Chang

    Version of Record online : 4 JUL 2016, DOI: 10.1002/sec.1510

  8. Efficient homomorphic sealed-bid auction free of bid validity check and equality test

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 64–76, Kun Peng

    Version of Record online : 17 MAY 2012, DOI: 10.1002/sec.549

  9. AD-ASGKA – authenticated dynamic protocols for asymmetric group key agreement

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1340–1352, Mingchu Li, Xiaodong Xu, Cheng Guo and Xing Tan

    Version of Record online : 26 JAN 2016, DOI: 10.1002/sec.1420

  10. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.566

  11. Security approach to controlling access to personal health records in healthcare service

    Security and Communication Networks

    Volume 9, Issue 7, 10 May 2016, Pages: 652–666, Tzer-Long Chen, Yu-Ting Liao, Yi-Fan Chang and Jen-Hung Hwang

    Version of Record online : 3 DEC 2015, DOI: 10.1002/sec.1387

  12. Equitable List Coloring of Graphs with Bounded Degree

    Journal of Graph Theory

    Volume 74, Issue 3, November 2013, Pages: 309–334, H. A. Kierstead and A. V. Kostochka

    Version of Record online : 10 DEC 2012, DOI: 10.1002/jgt.21710

  13. Leakage-resilient certificate-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3346–3355, Qihong Yu, Jiguo Li and Yichen Zhang

    Version of Record online : 4 MAY 2015, DOI: 10.1002/sec.1258

  14. Efficient chosen ciphertext secure public-key encryption under factoring assumption

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 351–360, Baodong Qin and Shengli Liu

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.571

  15. Efficient and adaptively secure broadcast encryption systems

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 1044–1052, Mingwu Zhang, Bo Yang, Zhenhua Chen and Tsuyoshi Takagi

    Version of Record online : 12 NOV 2012, DOI: 10.1002/sec.678

  16. A novel one-to-many and many-to-one asymmetric encryption model and its algorithms

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3906–3913, Run-hua Shi, Hong Zhong, Jie Cui and Shun Zhang

    Version of Record online : 14 JUL 2015, DOI: 10.1002/sec.1309

  17. Anonymous proxy re-encryption

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 439–449, Jun Shao, Peng Liu, Guiyi Wei and Yun Ling

    Version of Record online : 4 MAY 2011, DOI: 10.1002/sec.326

  18. Practical identity-based encryption in multiple private key generator (PKG) environments

    Security and Communication Networks

    Volume 8, Issue 1, 10 January 2015, Pages: 43–50, Shengbao Wang, Zhenfu Cao, Qi Xie and Wenhao Liu

    Version of Record online : 18 MAR 2013, DOI: 10.1002/sec.743

  19. Threshold visual secret sharing based on Boolean operations

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 653–664, Sachin Kumar and Rajendra K. Sharma

    Version of Record online : 17 MAY 2013, DOI: 10.1002/sec.769

  20. More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 173–181, Hongbing Wang and Zhenfu Cao

    Version of Record online : 5 JUN 2012, DOI: 10.1002/sec.552