Search Results

There are 18040 results for: content related to: Robust password changing and DoS resilience for human-centric password authentication

  1. A new method of formalizing anonymity based on protocol composition logic

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1132–1140, Tao Feng, Shining Han, Xian Guo and Donglin Ma

    Version of Record online : 8 OCT 2014, DOI: 10.1002/sec.1068

  2. Coloring Graphs with Dense Neighborhoods

    Journal of Graph Theory

    Volume 76, Issue 4, August 2014, Pages: 323–340, Landon Rabern

    Version of Record online : 9 OCT 2013, DOI: 10.1002/jgt.21768

  3. Secure SIP authentication scheme supporting lawful interception

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 340–350, Qiong Pu, Jian Wang and Shuhua Wu

    Version of Record online : 5 JUN 2012, DOI: 10.1002/sec.568

  4. Matrix embedding in multicast steganography: analysis in privacy, security and immediacy

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 791–802, Weiwei Liu, Guangjie Liu and Yuewei Dai

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1168

  5. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  6. A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks

    Security and Communication Networks

    Volume 7, Issue 3, March 2014, Pages: 588–601, Amizah Malip, Siaw-Lynn Ng and Qin Li

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.760

  7. A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1384–1397, Zuowen Tan

    Version of Record online : 2 FEB 2016, DOI: 10.1002/sec.1424

  8. A new certificateless authenticated key agreement protocol for SIP with different KGCs

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 631–643, Xiaowei Li, Yuqing Zhang and Geifei Zhang

    Version of Record online : 5 JUL 2012, DOI: 10.1002/sec.595

  9. Stability Analysis and Controller Design of Discrete Interval Type-2 Fuzzy Systems

    Asian Journal of Control

    Volume 16, Issue 4, July 2014, Pages: 1091–1104, Long Sheng and Xiaoyu Ma

    Version of Record online : 16 AUG 2013, DOI: 10.1002/asjc.768

  10. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.566

  11. A two-factor authentication scheme with anonymity for multi-server environments

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1608–1625, Chi-Tung Chen and Cheng-Chi Lee

    Version of Record online : 5 SEP 2014, DOI: 10.1002/sec.1109

  12. New construction of affiliation-hiding authenticated group key agreement

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 723–734, Chang Xu, Hua Guo, Zhoujun Li and Yi Mu

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.606

  13. Solution of the dynamic population balance equation describing breakage–coalescence systems in agitated vessels: The least-squares method

    The Canadian Journal of Chemical Engineering

    Volume 92, Issue 2, February 2014, Pages: 266–287, Jannike Solsvik and Hugo A. Jakobsen

    Version of Record online : 10 OCT 2013, DOI: 10.1002/cjce.21882

  14. Fast authentication mechanism with provable correctness for cluster-based VANETs

    Security and Communication Networks

    Volume 7, Issue 6, June 2014, Pages: 1016–1030, Jung-San Lee and Ya-Chieh Huang

    Version of Record online : 14 JUN 2013, DOI: 10.1002/sec.818

  15. Particle resolved simulations of carbon oxidation in a laminar flow

    The Canadian Journal of Chemical Engineering

    Volume 92, Issue 10, October 2014, Pages: 1669–1686, Dmitry Safronov, Matthias Kestel, Petr Nikrityuk and Bernd Meyer

    Version of Record online : 29 AUG 2014, DOI: 10.1002/cjce.22017

  16. A simple and robust anonymous two-factor authenticated key exchange protocol

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 711–722, Xiaowei Li and Yuqing Zhang

    Version of Record online : 13 AUG 2012, DOI: 10.1002/sec.605

  17. Dynamic CEO Compensation

    The Journal of Finance

    Volume 67, Issue 5, October 2012, Pages: 1603–1647, ALEX EDMANS, XAVIER GABAIX, TOMASZ SADZIK and YULIY SANNIKOV

    Version of Record online : 12 SEP 2012, DOI: 10.1111/j.1540-6261.2012.01768.x

  18. Constant-free explicit error estimator with sharp upper error bound property for adaptive FE analysis in elasticity and fracture

    International Journal for Numerical Methods in Engineering

    Volume 101, Issue 2, 13 January 2015, Pages: 79–126, T. Gerasimov, E. Stein and P. Wriggers

    Version of Record online : 20 OCT 2014, DOI: 10.1002/nme.4768

  19. Anonymous password-based key exchange with low resources consumption and better user-friendliness

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1379–1393, Haifeng Qian, Junqing Gong and Yuan Zhou

    Version of Record online : 8 FEB 2012, DOI: 10.1002/sec.501

  20. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Version of Record online : 24 FEB 2012, DOI: 10.1002/sec.509