Search Results

There are 12194 results for: content related to: A hill cipher-based remote data possession checking in cloud storage

  1. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  2. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  3. Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4157–4176, Y. Sreenivasa Rao and Ratna Dutta

    Version of Record online : 26 AUG 2015, DOI: 10.1002/sec.1331

  4. Generic constructions of secure-channel free searchable encryption with adaptive security

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1547–1560, Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman and Kazumasa Omote

    Version of Record online : 25 SEP 2014, DOI: 10.1002/sec.1103

  5. Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2214–2231, SK Hafizul Islam, Muhammad Khurram Khan and Ali M. Al-Khouri

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1165

  6. Efficient oblivious transfer with adaptive queries in UC framework

    Security and Communication Networks

    Vandana Guleria and Ratna Dutta

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1505

  7. Achieving dynamic privileges in secure data sharing on cloud storage

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2211–2224, Xingwen Zhao and Hui Li

    Version of Record online : 14 MAR 2013, DOI: 10.1002/sec.739

  8. Anonymous attribute-based proxy re-encryption for access control in cloud computing

    Security and Communication Networks

    Yinghui Zhang, Jin Li, Xiaofeng Chen and Hui Li

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1509

  9. Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1525–1536, Jinyong Chang and Rui Xue

    Version of Record online : 2 SEP 2014, DOI: 10.1002/sec.1101

  10. On the application of generic CCA-secure transformations to proxy re-encryption

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1769–1785, David Nuñez, Isaac Agudo and Javier Lopez

    Version of Record online : 19 FEB 2016, DOI: 10.1002/sec.1434

  11. Signcryption KEM/tag-KEM, revisited

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3067–3082, Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng and Yuan Zhou

    Version of Record online : 25 MAR 2015, DOI: 10.1002/sec.1232

  12. Proxy signcryption scheme in the standard model

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1431–1446, Yang Ming and Yumin Wang

    Version of Record online : 2 SEP 2014, DOI: 10.1002/sec.1092

  13. Public-key encryption with keyword search secure against continual memory attacks

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1613–1629, Chengyu Hu, Rupeng Yang, Pengtao Liu, Zuoxia Yu, Yongbin Zhou and Qiuliang Xu

    Version of Record online : 12 FEB 2016, DOI: 10.1002/sec.1451

  14. Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1676–1697, Yoshikazu Hanatani, Goichiro Hanaoka, Takahiro Matsuda and Takashi Yamakawa

    Version of Record online : 2 MAR 2016, DOI: 10.1002/sec.1444

  15. Identity-based signcryption from lattices

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3751–3770, Jianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang and Wenbin Yao

    Version of Record online : 23 JUL 2015, DOI: 10.1002/sec.1297

  16. Anonymous proxy re-encryption

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 439–449, Jun Shao, Peng Liu, Guiyi Wei and Yun Ling

    Version of Record online : 4 MAY 2011, DOI: 10.1002/sec.326

  17. Efficient chosen ciphertext secure identity-based encryption against key leakage attacks

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1417–1434, Shi-Feng Sun, Dawu Gu and Shengli Liu

    Version of Record online : 2 FEB 2016, DOI: 10.1002/sec.1429

  18. New method of key-dependent message security for asymmetric encryption

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2157–2170, Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang and Fenghe Wang

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1160

  19. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 189–200, Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Version of Record online : 22 FEB 2012, DOI: 10.1002/sec.417

  20. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Version of Record online : 1 JUN 2015, DOI: 10.1002/sec.1285