Search Results

There are 3562 results for: content related to: Lightweight key management on sensitive data in the cloud

  1. Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1676–1697, Yoshikazu Hanatani, Goichiro Hanaoka, Takahiro Matsuda and Takashi Yamakawa

    Version of Record online : 2 MAR 2016, DOI: 10.1002/sec.1444

  2. Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1843–1863, Yanfei Guo and Zhenfeng Zhang

    Version of Record online : 27 AUG 2013, DOI: 10.1002/sec.868

  3. Towards fair mutual private set intersection with linear complexity

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1589–1612, Sumit Kumar Debnath and Ratna Dutta

    Version of Record online : 6 MAR 2016, DOI: 10.1002/sec.1450

  4. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3356–3371, Zheng Yang, Wu Yang, Lingyun Zhu and Daigu Zhang

    Version of Record online : 19 MAY 2015, DOI: 10.1002/sec.1263

  5. Efficient oblivious transfer with adaptive queries in UC framework

    Security and Communication Networks

    Vandana Guleria and Ratna Dutta

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1505

  6. Anonymous attribute-based proxy re-encryption for access control in cloud computing

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2397–2411, Yinghui Zhang, Jin Li, Xiaofeng Chen and Hui Li

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1509

  7. Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4157–4176, Y. Sreenivasa Rao and Ratna Dutta

    Version of Record online : 26 AUG 2015, DOI: 10.1002/sec.1331

  8. Identity-based signcryption from lattices

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3751–3770, Jianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang and Wenbin Yao

    Version of Record online : 23 JUL 2015, DOI: 10.1002/sec.1297

  9. Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2214–2231, SK Hafizul Islam, Muhammad Khurram Khan and Ali M. Al-Khouri

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1165

  10. Generic transformations for existentially unforgeable signature schemes in the bounded leakage model

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1829–1842, Yuyu Wang and Keisuke Tanaka

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1436

  11. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Version of Record online : 1 JUN 2015, DOI: 10.1002/sec.1285

  12. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  13. Active jamming for multi-user information security improvement with the access statuses of users

    Security and Communication Networks

    Datong Xu, Pinyi Ren, Qinghe Du and Li Sun

    Version of Record online : 25 AUG 2016, DOI: 10.1002/sec.1592

  14. Security analysis and design of an efficient ECC-based two-factor password authentication scheme

    Security and Communication Networks

    Tanmoy Maitra, Mohammad S. Obaidat, SK Hafizul Islam, Debasis Giri and Ruhul Amin

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1596

  15. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2070–2092, Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and Xiong Li

    Version of Record online : 23 FEB 2016, DOI: 10.1002/sec.1464

  16. Verifiable attribute-based proxy re-encryption for secure public cloud data sharing

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1748–1758, Suqing Lin, Rui Zhang and Mingsheng Wang

    Version of Record online : 10 FEB 2016, DOI: 10.1002/sec.1446

  17. A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2836–2849, Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong and Xiaohua Jia

    Version of Record online : 13 FEB 2015, DOI: 10.1002/sec.1208

  18. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.328

  19. Security analysis of SM2 key exchange protocol in TPM2.0

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 383–395, Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin and Dengguo Feng

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.987

  20. Yet another attack on the chinese remainder theorem-based hierarchical access control scheme

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1079–1095, Niu Liu, Shaohua Tang and Lingling Xu

    Version of Record online : 5 JUL 2013, DOI: 10.1002/sec.837