Search Results

There are 2082 results for: content related to: Generation of potential wells used for quantum codes transmission via a TDMA network communication system

  1. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  2. Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS

    Security and Communication Networks

    Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li and Fan Wu

    Article first published online : 11 FEB 2016, DOI: 10.1002/sec.1452

  3. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4136–4156, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 27 AUG 2015, DOI: 10.1002/sec.1330

  4. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  5. Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models

    Security and Communication Networks

    Yoshikazu Hanatani, Goichiro Hanaoka, Takahiro Matsuda and Takashi Yamakawa

    Article first published online : 2 MAR 2016, DOI: 10.1002/sec.1444

  6. Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3415–3440, Jaydeep Howlader and Ashis Kumar Mal

    Article first published online : 25 MAY 2015, DOI: 10.1002/sec.1268

  7. Towards fair mutual private set intersection with linear complexity

    Security and Communication Networks

    Sumit Kumar Debnath and Ratna Dutta

    Article first published online : 6 MAR 2016, DOI: 10.1002/sec.1450

  8. Generic transformations for existentially unforgeable signature schemes in the bounded leakage model

    Security and Communication Networks

    Yuyu Wang and Keisuke Tanaka

    Article first published online : 11 FEB 2016, DOI: 10.1002/sec.1436

  9. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3356–3371, Zheng Yang, Wu Yang, Lingyun Zhu and Daigu Zhang

    Article first published online : 19 MAY 2015, DOI: 10.1002/sec.1263

  10. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Article first published online : 1 JUN 2015, DOI: 10.1002/sec.1285

  11. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Article first published online : 12 JAN 2015, DOI: 10.1002/sec.1164

  12. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Article first published online : 17 DEC 2012, DOI: 10.1002/sec.650

  13. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  14. Provably secure group key agreement protocol based on ECDH with integrated signature

    Security and Communication Networks

    Vankamamidi S. Naresh and Nistala V. E. S. Murthy

    Article first published online : 29 DEC 2015, DOI: 10.1002/sec.1402

  15. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

    Security and Communication Networks

    Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and Xiong Li

    Article first published online : 23 FEB 2016, DOI: 10.1002/sec.1464

  16. Analysis of the information theoretically secret key agreement by public discussion

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2507–2523, Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo and Lin You

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1192

  17. A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2836–2849, Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong and Xiaohua Jia

    Article first published online : 13 FEB 2015, DOI: 10.1002/sec.1208

  18. An enhanced privacy preserving remote user authentication scheme with provable security

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3782–3795, Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Husnain Naqvi, Saru Kumari and Muhammad Khurram Khan

    Article first published online : 29 JUN 2015, DOI: 10.1002/sec.1299

  19. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Article first published online : 18 MAY 2011, DOI: 10.1002/sec.328

  20. Yet another attack on the chinese remainder theorem-based hierarchical access control scheme

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1079–1095, Niu Liu, Shaohua Tang and Lingling Xu

    Article first published online : 5 JUL 2013, DOI: 10.1002/sec.837