Search Results

There are 2246 results for: content related to: Argument on biometrics identity-based encryption schemes

  1. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.566

  2. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  3. New construction of affiliation-hiding authenticated group key agreement

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 723–734, Chang Xu, Hua Guo, Zhoujun Li and Yi Mu

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.606

  4. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1016–1024, Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu and Yichen Zhang

    Version of Record online : 18 DEC 2015, DOI: 10.1002/sec.1396

  5. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 189–200, Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Version of Record online : 22 FEB 2012, DOI: 10.1002/sec.417

  6. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1698–1716, Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827

  7. A new certificateless authenticated key agreement protocol for SIP with different KGCs

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 631–643, Xiaowei Li, Yuqing Zhang and Geifei Zhang

    Version of Record online : 5 JUL 2012, DOI: 10.1002/sec.595

  8. A short redactable signature scheme using pairing

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 523–534, Seongan Lim, Eunjeong Lee and Cheol-Min Park

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.346

  9. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.328

  10. Anonymous proxy re-encryption

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 439–449, Jun Shao, Peng Liu, Guiyi Wei and Yun Ling

    Version of Record online : 4 MAY 2011, DOI: 10.1002/sec.326

  11. Secure identity-based multisignature schemes under quadratic residue assumptions

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 689–701, Lifei Wei, Zhenfu Cao and Xiaolei Dong

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.600

  12. More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 173–181, Hongbing Wang and Zhenfu Cao

    Version of Record online : 5 JUN 2012, DOI: 10.1002/sec.552

  13. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Version of Record online : 24 FEB 2012, DOI: 10.1002/sec.509

  14. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Version of Record online : 17 DEC 2012, DOI: 10.1002/sec.650

  15. Attribute-based ring signcryption scheme

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 790–796, Zhenzhou Guo, Mingchu Li and Xinxin Fan

    Version of Record online : 28 SEP 2012, DOI: 10.1002/sec.614

  16. Identity-based universal re-encryption for mixnets

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 2992–3001, Habib Allah Yajam, Javad Mohajeri and Mahmoud Salmasizadeh

    Version of Record online : 18 FEB 2015, DOI: 10.1002/sec.1226

  17. Known-plaintext attack on secure kNN computation on encrypted databases

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2432–2441, Gu Chunsheng and Gu Jixing

    Version of Record online : 17 JAN 2014, DOI: 10.1002/sec.954

  18. Identity-based optimistic fair exchange in the standard model

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 1010–1020, Lei Zhang, Qianhong Wu and Bo Qin

    Version of Record online : 26 NOV 2012, DOI: 10.1002/sec.652

  19. Efficient identity-based strong designated verifier signature schemes

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 902–911, Meijiao Duan, Jing Xu and Dengguo Feng

    Version of Record online : 26 NOV 2012, DOI: 10.1002/sec.645

  20. Efficient chosen ciphertext secure public-key encryption under factoring assumption

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 351–360, Baodong Qin and Shengli Liu

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.571