Search Results

There are 10469 results for: content related to: A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks

  1. Reconstruction-based fault prognosis for flue gas turbines with independent component analysis

    Asia-Pacific Journal of Chemical Engineering

    Volume 9, Issue 2, March/April 2014, Pages: 205–213, Jie Ma, Qiuyan Wang, Gang Li and Donghua Zhou

    Article first published online : 30 JUL 2013, DOI: 10.1002/apj.1760

  2. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  3. Chaotic map-based three-party authenticated key agreement

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2469–2474, Han-Yu Lin

    Article first published online : 28 JAN 2014, DOI: 10.1002/sec.960

  4. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Article first published online : 17 DEC 2012, DOI: 10.1002/sec.650

  5. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.540

  6. Enhanced authentication for commercial video services

    Security and Communication Networks

    Volume 5, Issue 11, November 2012, Pages: 1248–1259, Xinyi Huang, Cheng-Kang Chu, Hung-Min Sun, Jianying Zhou and Robert H. Deng

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.620

  7. Secured hierarchical secret sharing using ECC based signcryption

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 752–763, Atanu Basu, Indranil Sengupta and Jamuna Kanta Sing

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.370

  8. New public key cryptosystems based on non-Abelian factorization problems

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 912–922, Lize Gu, Licheng Wang, Kaoru Ota, Mianxiong Dong, Zhenfu Cao and Yixian Yang

    Article first published online : 1 MAR 2013, DOI: 10.1002/sec.710

  9. Secure identity-based multisignature schemes under quadratic residue assumptions

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 689–701, Lifei Wei, Zhenfu Cao and Xiaolei Dong

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.600

  10. A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1860–1871, Lu Leng, Andrew Beng Jin Teoh, Ming Li and Muhammad Khurram Khan

    Article first published online : 12 NOV 2013, DOI: 10.1002/sec.900

  11. A graph-theoretic framework for isolating botnets in a network

    Security and Communication Networks

    Padmini Jaikumar and Avinash C. Kak

    Article first published online : 28 FEB 2012, DOI: 10.1002/sec.500

  12. A fictitious play-based response strategy for multistage intrusion defense systems

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 473–491, Yi Luo, Ferenc Szidarovszky, Youssif Al-Nashif and Salim Hariri

    Article first published online : 28 FEB 2013, DOI: 10.1002/sec.730

  13. Certificateless broadcast authentication for vehicular ad hoc networks

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 602–611, Eun-Kyung Ryu and Kee-Young Yoo

    Article first published online : 27 JUN 2012, DOI: 10.1002/sec.590

  14. A second preimage attack on zipper hash

    Security and Communication Networks

    Shiwei Chen and Chenhui Jin

    Article first published online : 26 JAN 2015, DOI: 10.1002/sec.1210

  15. Novel principle and adaptive scheme of phase correlation line current differential protection

    International Transactions on Electrical Energy Systems

    Volume 23, Issue 5, July 2013, Pages: 733–750, Bin Li, Chao Li, Jiali He, Zhiqian Bo and Tony Yip

    Article first published online : 9 MAY 2013, DOI: 10.1002/etep.1760

  16. A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography

    Security and Communication Networks

    Yuanyuan Zhang, Neeraj Kumar, Jianhua Chen and Joel J.  P.  C. Rodrigues

    Article first published online : 19 FEB 2015, DOI: 10.1002/sec.1230

  17. Dynamic trust evaluation and scheduling framework for cloud computing

    Security and Communication Networks

    Volume 5, Issue 3, March 2012, Pages: 311–318, Wei Wang, Guosun Zeng, Junqi Zhang and Daizhong Tang

    Article first published online : 16 AUG 2011, DOI: 10.1002/sec.350

  18. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Article first published online : 24 FEB 2012, DOI: 10.1002/sec.509

  19. Efficient homomorphic sealed-bid auction free of bid validity check and equality test

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 64–76, Kun Peng

    Article first published online : 17 MAY 2012, DOI: 10.1002/sec.549

  20. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Article first published online : 22 FEB 2012, DOI: 10.1002/sec.417