Search Results

There are 8646 results for: content related to: PPGJ: A privacy-preserving general join for outsourced encrypted database

  1. Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.940

  2. One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1796–1809, Dennis Y. W. Liu and Duncan S. Wong

    Version of Record online : 4 JUL 2013, DOI: 10.1002/sec.812

  3. n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 550–564, Zhengan Huang, Shengli Liu and Kefei Chen

    Version of Record online : 4 APR 2014, DOI: 10.1002/sec.1002

  4. On cross-correlation properties of S-boxes and their design using semi-bent functions

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 790–800, Enes Pasalic, Samed Bajrić and Milan Djordjević

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1035

  5. Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 343–359, Cristina Rottondi, Marco Savi, Giacomo Verticale and Christoph Krauß

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.983

  6. Privacy preserving revocable predicate encryption revisited

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 471–485, Kwangsu Lee, Intae Kim and Seong Oun Hwang

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.994

  7. Security analysis of SM2 key exchange protocol in TPM2.0

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 383–395, Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin and Dengguo Feng

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.987

  8. A more secure and efficient Andrew Secure RPC protocol

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2063–2077, Sirapat Boonkrong

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.918

  9. Yet another attack on the chinese remainder theorem-based hierarchical access control scheme

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1079–1095, Niu Liu, Shaohua Tang and Lingling Xu

    Version of Record online : 5 JUL 2013, DOI: 10.1002/sec.837

  10. Attribute-based signature for threshold predicates from lattices

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 811–821, Qingbin Wang and Shaozhen Chen

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1038

  11. MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1641–1651, Hongbing Wang, Peng Zeng and Kim-Kwang Raymond Choo

    Version of Record online : 19 AUG 2013, DOI: 10.1002/sec.861

  12. Large universe decentralized key-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 501–509, Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong and Ximeng Liu

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.997

  13. Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1974–1987, Mingwu Zhang, Bo Yang, Chunzhi Wang and Tsuyoshi Takagi

    Version of Record online : 18 NOV 2013, DOI: 10.1002/sec.912

  14. Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1843–1863, Yanfei Guo and Zhenfeng Zhang

    Version of Record online : 27 AUG 2013, DOI: 10.1002/sec.868

  15. The applications of Saddle point theorem to Dirichlet boundary value problem of differential system

    Mathematical Methods in the Applied Sciences

    Volume 37, Issue 16, 15 November 2014, Pages: 2562–2569, Weigao Ge and Yu Tian

    Version of Record online : 11 MAR 2014, DOI: 10.1002/mma.2997

  16. Reliability enhancement for CIR-based physical layer authentication

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 661–671, Jiazi Liu, Ahmed Refaey, Xianbin Wang and Helen Tang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1014

  17. On the asymptotic behavior of a linear viscoelastic fluid

    Mathematical Methods in the Applied Sciences

    Volume 35, Issue 7, 15 May 2012, Pages: 769–775, Mauro Fabrizio, Barbara Lazzari and Roberta Nibbi

    Version of Record online : 10 APR 2012, DOI: 10.1002/mma.1602

  18. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1036

  19. A complete upper estimate on the localization for the degenerate parabolic equation with nonlinear source

    Mathematical Methods in the Applied Sciences

    Volume 38, Issue 4, 15 March 2015, Pages: 630–635, Pan Zheng and Chunlai Mu

    Version of Record online : 7 FEB 2014, DOI: 10.1002/mma.3094

  20. On the linear complexity of generalized cyclotomic binary sequences of length 2pq

    Concurrency and Computation: Practice and Experience

    Volume 26, Issue 8, 10 June 2014, Pages: 1520–1530, Zu-Ling Chang and Dandan Li

    Version of Record online : 31 MAY 2013, DOI: 10.1002/cpe.3052