Search Results

There are 938 results for: content related to: Efficient three-party encrypted key exchange using trapdoor functions

  1. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Article first published online : 12 JAN 2015, DOI: 10.1002/sec.1164

  2. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1732–1751, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 23 OCT 2014, DOI: 10.1002/sec.1139

  3. An anonymous and secure biometric-based enterprise digital rights management system for mobile environment

    Security and Communication Networks

    Ashok Kumar Das, Dheerendra Mishra and Sourav Mukhopadhyay

    Article first published online : 11 MAY 2015, DOI: 10.1002/sec.1266

  4. Yet another attack on the chinese remainder theorem-based hierarchical access control scheme

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1079–1095, Niu Liu, Shaohua Tang and Lingling Xu

    Article first published online : 5 JUL 2013, DOI: 10.1002/sec.837

  5. Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 612–630, Jingqiang Lin, Peng Liu, Jiwu Jing and Qiongxiao Wang

    Article first published online : 13 NOV 2012, DOI: 10.1002/sec.593

  6. Sealed-bid auction: a cryptographic solution to bid-rigging attack in the collusive environment

    Security and Communication Networks

    Jaydeep Howlader and Ashis Kumar Mal

    Article first published online : 25 MAY 2015, DOI: 10.1002/sec.1268

  7. SecureTCG: a lightweight cheating-detection protocol for P2P multiplayer online trading card games

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2412–2431, Marcos A. Simplicio Jr., Mateus A.S. Santos, Rodrigo R. Leal, Marco A.L. Gomes and Walter A. Goya

    Article first published online : 17 JAN 2014, DOI: 10.1002/sec.952

  8. Analysis on the generalization of proxy signature

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 549–566, Namita Tiwari and Sahadeo Padhye

    Article first published online : 27 JUN 2012, DOI: 10.1002/sec.581

  9. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Article first published online : 24 FEB 2012, DOI: 10.1002/sec.509

  10. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation

    Security and Communication Networks

    Zheng Yang, Wu Yang, Lingyun Zhu and Daigu Zhang

    Article first published online : 19 MAY 2015, DOI: 10.1002/sec.1263

  11. Efficient homomorphic sealed-bid auction free of bid validity check and equality test

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 64–76, Kun Peng

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.549

  12. New method of key-dependent message security for asymmetric encryption

    Security and Communication Networks

    Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang and Fenghe Wang

    Article first published online : 14 NOV 2014, DOI: 10.1002/sec.1160

  13. Efficient revocable identity-based encryption from multilinear maps

    Security and Communication Networks

    Xianping Mao, Junzuo Lai, Kefei Chen, Jian Weng and Qixiang Mei

    Article first published online : 11 MAY 2015, DOI: 10.1002/sec.1274

  14. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Article first published online : 22 FEB 2012, DOI: 10.1002/sec.417

  15. Biometric key-binding using lattice masking

    Security and Communication Networks

    Masaya Yasuda and Yuka Sugimura

    Article first published online : 1 MAY 2015, DOI: 10.1002/sec.1267

  16. A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario

    Security and Communication Networks

    Fajiang Yu, Huanguo Zhang, Bo Zhao, Juan Wang, Liqiang Zhang, Fei Yan and Zhenlin Chen

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1193

  17. Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 740–750, Joonsang Baek, Young-ji Byon, Eman Hableel and Mahmoud Al-Qutayri

    Article first published online : 7 MAY 2014, DOI: 10.1002/sec.1021

  18. A privacy preserving authentication scheme for roaming services in global mobility networks

    Security and Communication Networks

    Gefei Zhang, Dan Fan, Yuqing Zhang, Xiaowei Li and Xuefeng Liu

    Article first published online : 9 FEB 2015, DOI: 10.1002/sec.1209

  19. Certificateless online/offline signcryption scheme

    Security and Communication Networks

    Jiguo Li, Jingjing Zhao and Yichen Zhang

    Article first published online : 21 DEC 2014, DOI: 10.1002/sec.1146

  20. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Angel Martín del Rey

    Article first published online : 28 JAN 2015, DOI: 10.1002/sec.1186