Search Results

There are 5594553 results for: content related to: Special issue on applied cryptography for information and communication networks

  1. New method of key-dependent message security for asymmetric encryption

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2157–2170, Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang and Fenghe Wang

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1160

  2. Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3205–3218, Xiang Cheng, Sen Su, Yiping Teng and Ke Xiao

    Version of Record online : 30 MAR 2015, DOI: 10.1002/sec.1245

  3. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  4. Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.940

  5. DualAcE: fine-grained dual access control enforcement with multi-privacy guarantee in DaaS

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1494–1508, Xiuxia Tian, Ling Huang, Yong Wang, Chaofeng Sha and Xiaoling Wang

    Version of Record online : 9 SEP 2014, DOI: 10.1002/sec.1098

  6. Achieving dynamic privileges in secure data sharing on cloud storage

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2211–2224, Xingwen Zhao and Hui Li

    Version of Record online : 14 MAR 2013, DOI: 10.1002/sec.739

  7. Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity

    Security and Communication Networks

    Mingwu Zhang, Yi Mu, Jian Shen and Xinyi Huang

    Version of Record online : 10 FEB 2016, DOI: 10.1002/sec.1435

  8. Lattice-based obfuscation for re-encryption functions

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1648–1658, Rong Cheng and Fangguo Zhang

    Version of Record online : 19 OCT 2014, DOI: 10.1002/sec.1112

  9. Identity-based universal re-encryption for mixnets

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 2992–3001, Habib Allah Yajam, Javad Mohajeri and Mahmoud Salmasizadeh

    Version of Record online : 18 FEB 2015, DOI: 10.1002/sec.1226

  10. Ultra simple way to encrypt non-volatile main memory

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1155–1168, Fangyong Hou and Hongjun He

    Version of Record online : 4 AUG 2014, DOI: 10.1002/sec.1071

  11. Privacy preserving revocable predicate encryption revisited

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 471–485, Kwangsu Lee, Intae Kim and Seong Oun Hwang

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.994

  12. Privacy-assured substructure similarity query over encrypted graph-structured data in cloud

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1933–1944, Yingguang Zhang, Sen Su, Yulong Wang, Weifeng Chen and Fangchun Yang

    Version of Record online : 18 NOV 2013, DOI: 10.1002/sec.907

  13. Privacy-preserving framework for geosocial applications

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1764–1779, Lukas Malina and Jan Hajny

    Version of Record online : 31 AUG 2013, DOI: 10.1002/sec.873

  14. On the application of generic CCA-secure transformations to proxy re-encryption

    Security and Communication Networks

    David Nuñez, Isaac Agudo and Javier Lopez

    Version of Record online : 19 FEB 2016, DOI: 10.1002/sec.1434

  15. Proxy re-encryption via indistinguishability obfuscation

    Security and Communication Networks

    Satsuya Ohata and Kanta Matsuura

    Version of Record online : 10 FEB 2016, DOI: 10.1002/sec.1445

  16. Protect biometric data with compound chaotic encryption

    Security and Communication Networks

    Charles Z. Liew, Raymond Shaw and Lanlan Li

    Version of Record online : 15 AUG 2014, DOI: 10.1002/sec.1070

  17. Privacy preserving smartcard-based authentication system with provable security

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3028–3044, Jin Wook Byun

    Version of Record online : 17 FEB 2015, DOI: 10.1002/sec.1229

  18. Lightweight key management on sensitive data in the cloud

    Security and Communication Networks

    Volume 6, Issue 10, October 2013, Pages: 1290–1299, Zongmin Cui, Hong Zhu and Lianhua Chi

    Version of Record online : 28 AUG 2013, DOI: 10.1002/sec.850

  19. Fusion: coalesced confidential storage and communication framework for the IoT

    Security and Communication Networks

    Ibrahim Ethem Bagci, Shahid Raza, Utz Roedig and Thiemo Voigt

    Version of Record online : 30 APR 2015, DOI: 10.1002/sec.1260

  20. Generic constructions of secure-channel free searchable encryption with adaptive security

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1547–1560, Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman and Kazumasa Omote

    Version of Record online : 25 SEP 2014, DOI: 10.1002/sec.1103