Search Results

There are 8860 results for: content related to: Secure secret reconstruction and multi-secret sharing schemes with unconditional security

  1. Content-based image authentication by feature point clustering and matching

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 636–647, Lei Yang, Jun Tian and Dapeng Wu

    Article first published online : 23 AUG 2011, DOI: 10.1002/sec.358

  2. Computer virus propagation model based on bounded rationality evolutionary game theory

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 210–218, Cong Jin, Shu-Wei Jin and Hua-Yong Tan

    Article first published online : 9 MAY 2012, DOI: 10.1002/sec.558

  3. You have free access to this content
    A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  4. An integer linear programming formulation for power equalization placement to limit jamming attack propagation in transparent optical networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2463–2468, Nina Skorin-Kapov, Amornrat Jirattigalachote and Lena Wosinska

    Article first published online : 17 JAN 2014, DOI: 10.1002/sec.958

  5. Energy optimization of integrated atmospheric and vacuum crude distillation units in oil refinery with light crude

    Asia-Pacific Journal of Chemical Engineering

    Volume 9, Issue 2, March/April 2014, Pages: 181–195, Eid M. Al-Mutairi and Badiea S. Babaqi

    Article first published online : 6 AUG 2013, DOI: 10.1002/apj.1758

  6. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540

  7. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  8. Privacy and integrity preserving skyline queries in tiered sensor networks

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1177–1188, Jinguo Li, Yaping Lin, Gang Wang, Rui Li and Bo Yin

    Article first published online : 25 JUL 2013, DOI: 10.1002/sec.852

  9. Efficient and fault-diagnosable authentication architecture for AMI in smart grid

    Security and Communication Networks

    Depeng Li, Zeyar Aung, John R. Williams and Abel Sanchez

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1006

  10. TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 245–264, Mehran S. Fallah and Nafiseh Kahani

    Article first published online : 14 FEB 2013, DOI: 10.1002/sec.725

  11. CSP-DHIES: a new public-key encryption scheme from matrix conjugation

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 809–822, Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li and Yixian Yang

    Article first published online : 3 OCT 2011, DOI: 10.1002/sec.376

  12. Secure group and multi-layer group communication schemes based on polynomial interpolation

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 735–756, Purushothama B. R. and B. B. Amberker

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.607

  13. Client cloud Web service: reducing traffic consumption

    Security and Communication Networks

    Jung Ha Paik, Kwantae Cho, Boo Geum Jung and Dong Hoon Lee

    Article first published online : 5 JUN 2012, DOI: 10.1002/sec.544

  14. Balanced double subset difference broadcast encryption scheme

    Security and Communication Networks

    Shyh-Yih Wang, Wu-Chuan Yang and Ying-Jen Lin

    Article first published online : 5 AUG 2014, DOI: 10.1002/sec.1093

  15. Mechanisms to locate noncooperative transmitters in wireless networks based on residual signal strengths

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1788–1804, Éric Barthélémy and Jean-Marc Robert

    Article first published online : 24 OCT 2013, DOI: 10.1002/sec.877

  16. On downlink power allocation for multiuser variable-bit-rate video streaming

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 485–497, Yingsong Huang, Shiwen Mao and Yihan Li

    Article first published online : 9 NOV 2012, DOI: 10.1002/sec.642

  17. Protocol Derivation System for the Needham–Schroeder family

    Security and Communication Networks

    Junwei Zhang, Jianfeng Ma and Chao Yang

    Article first published online : 25 JUN 2012, DOI: 10.1002/sec.565

  18. Design of secure access control scheme for personal health record-based cloud healthcare service

    Security and Communication Networks

    Chia-Hui Liu, Fong-Qi Lin, Chin-Sheng Chen and Tzer-Shyong Chen

    Article first published online : 8 AUG 2014, DOI: 10.1002/sec.1087

  19. Secrecy capacity of wireless channels subject to log-normal fading

    Security and Communication Networks

    Volume 8, Issue 1, 10 January 2015, Pages: 25–35, Xian Liu

    Article first published online : 12 MAR 2013, DOI: 10.1002/sec.752

  20. Introducing proxy zero-knowledge proof and utilization in anonymous credential systems

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 161–172, Hoda Jannati, Mahmoud Salmasizadeh, Javad Mohajeri and Amir Moradi

    Article first published online : 18 APR 2012, DOI: 10.1002/sec.543