Search Results

There are 12756 results for: content related to: Privacy-preserving framework for geosocial applications

  1. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.915

  2. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 27 AUG 2015, DOI: 10.1002/sec.1330

  3. Analysis on the generalization of proxy signature

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 549–566, Namita Tiwari and Sahadeo Padhye

    Article first published online : 27 JUN 2012, DOI: 10.1002/sec.581

  4. New method of key-dependent message security for asymmetric encryption

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2157–2170, Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang and Fenghe Wang

    Article first published online : 14 NOV 2014, DOI: 10.1002/sec.1160

  5. A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1732–1751, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 23 OCT 2014, DOI: 10.1002/sec.1139

  6. A survey on secret key generation mechanisms on the physical layer in wireless networks

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 332–341, Youssef El Hajj Shehadeh and Dieter Hogrefe

    Article first published online : 4 MAR 2014, DOI: 10.1002/sec.973

  7. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Article first published online : 20 FEB 2014, DOI: 10.1002/sec.955

  8. One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Dennis Y.W. Liu and Duncan S. Wong

    Article first published online : 4 JUL 2013, DOI: 10.1002/sec.812

  9. Analyses of several recently proposed group key management schemes

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 136–148, Niu Liu, Shaohua Tang, Lingling Xu and Daojing He

    Article first published online : 5 MAR 2014, DOI: 10.1002/sec.966

  10. An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 245–260, Lili Xu and Fan Wu

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.977

  11. Timed-release oblivious transfer

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1138–1149, Lingling Xu, Fangguo Zhang and Shaohua Tang

    Article first published online : 28 AUG 2013, DOI: 10.1002/sec.845

  12. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Article first published online : 7 NOV 2013, DOI: 10.1002/sec.827

  13. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  14. A survey of cyber crimes

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 422–437, Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

    Article first published online : 13 JUL 2011, DOI: 10.1002/sec.331

  15. Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer

    Security and Communication Networks

    Mehmet Sabir Kiraz, Ziya Alper Genc and Suleyman Kardas

    Article first published online : 21 AUG 2015, DOI: 10.1002/sec.1329

  16. Privacy preserving revocable predicate encryption revisited

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 471–485, Kwangsu Lee, Intae Kim and Seong Oun Hwang

    Article first published online : 21 MAR 2014, DOI: 10.1002/sec.994

  17. On the IEEE 802.11i security: a denial-of-service perspective

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1378–1407, Rajeev Singh and Teek Parval Sharma

    Article first published online : 21 AUG 2014, DOI: 10.1002/sec.1079

  18. For your phone only: custom protocols for efficient secure function evaluation on mobile devices

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1165–1176, Henry Carter, Chaitrali Amrutkar, Italo Dacosta and Patrick Traynor

    Article first published online : 23 JUL 2013, DOI: 10.1002/sec.851

  19. Intrusion-aware trust model for vehicular ad hoc networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1652–1669, Riaz Ahmed Shaikh and Ahmed Saeed Alzahrani

    Article first published online : 19 AUG 2013, DOI: 10.1002/sec.862

  20. New rational parties relying on reputation

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1128–1137, Yilei Wang, Zhe Liu and Qiuliang Xu

    Article first published online : 28 NOV 2013, DOI: 10.1002/sec.844