Search Results

There are 2019 results for: content related to: Intrusion-aware trust model for vehicular ad hoc networks

  1. Efficient oblivious transfer with adaptive queries in UC framework

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2592–2611, Vandana Guleria and Ratna Dutta

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1505

  2. Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1843–1863, Yanfei Guo and Zhenfeng Zhang

    Version of Record online : 27 AUG 2013, DOI: 10.1002/sec.868

  3. Towards fair mutual private set intersection with linear complexity

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1589–1612, Sumit Kumar Debnath and Ratna Dutta

    Version of Record online : 6 MAR 2016, DOI: 10.1002/sec.1450

  4. Public-key encryption with keyword search secure against continual memory attacks

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1613–1629, Chengyu Hu, Rupeng Yang, Pengtao Liu, Zuoxia Yu, Yongbin Zhou and Qiuliang Xu

    Version of Record online : 12 FEB 2016, DOI: 10.1002/sec.1451

  5. Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1676–1697, Yoshikazu Hanatani, Goichiro Hanaoka, Takahiro Matsuda and Takashi Yamakawa

    Version of Record online : 2 MAR 2016, DOI: 10.1002/sec.1444

  6. Identity-based signcryption from lattices

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3751–3770, Jianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang and Wenbin Yao

    Version of Record online : 23 JUL 2015, DOI: 10.1002/sec.1297

  7. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3356–3371, Zheng Yang, Wu Yang, Lingyun Zhu and Daigu Zhang

    Version of Record online : 19 MAY 2015, DOI: 10.1002/sec.1263

  8. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Version of Record online : 1 JUN 2015, DOI: 10.1002/sec.1285

  9. Anonymous attribute-based proxy re-encryption for access control in cloud computing

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2397–2411, Yinghui Zhang, Jin Li, Xiaofeng Chen and Hui Li

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1509

  10. Verifiable attribute-based proxy re-encryption for secure public cloud data sharing

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1748–1758, Suqing Lin, Rui Zhang and Mingsheng Wang

    Version of Record online : 10 FEB 2016, DOI: 10.1002/sec.1446

  11. Security analysis of SM2 key exchange protocol in TPM2.0

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 383–395, Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin and Dengguo Feng

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.987

  12. Refined Shacham–Waters ring signature scheme in Seo–Cheon framework

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2122–2134, M. Prem Laxman Das, Jothi Rangasamy and R. Kabaleeshwaran

    Version of Record online : 12 MAY 2016, DOI: 10.1002/sec.1470

  13. Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4157–4176, Y. Sreenivasa Rao and Ratna Dutta

    Version of Record online : 26 AUG 2015, DOI: 10.1002/sec.1331

  14. Signcryption KEM/tag-KEM, revisited

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3067–3082, Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng and Yuan Zhou

    Version of Record online : 25 MAR 2015, DOI: 10.1002/sec.1232

  15. Certificateless aggregate signature with efficient verification

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2232–2243, Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang and Gwoboa Horng

    Version of Record online : 13 NOV 2014, DOI: 10.1002/sec.1166

  16. MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1641–1651, Hongbing Wang, Peng Zeng and Kim-Kwang Raymond Choo

    Version of Record online : 19 AUG 2013, DOI: 10.1002/sec.861

  17. Fuzzy certificateless signature

    Security and Communication Networks

    Liangliang Wang, Junzuo Lai, Hu Xiong, Kefei Chen and Yu Long

    Version of Record online : 9 AUG 2016, DOI: 10.1002/sec.1572

  18. CP-ABE with outsourced decryption and directionally hidden policy

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2387–2396, Zhiwei Wang and Wenyang Liu

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1507

  19. Privacy-preserving grouping proof with key exchange in the multiple-party setting

    Security and Communication Networks

    Yangguang Tian, Guomin Yang and Yi Mu

    Version of Record online : 14 JUL 2016, DOI: 10.1002/sec.1529

  20. Generic constructions of secure-channel free searchable encryption with adaptive security

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1547–1560, Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman and Kazumasa Omote

    Version of Record online : 25 SEP 2014, DOI: 10.1002/sec.1103