Search Results

There are 14912 results for: content related to: Hidden attribute-based signcryption scheme for lattice

  1. News Algorithms for tensor decomposition based on a reduced functional

    Numerical Linear Algebra with Applications

    Volume 21, Issue 3, May 2014, Pages: 340–374, Stefan Kindermann and Carmeliza Navasca

    Version of Record online : 14 MAR 2013, DOI: 10.1002/nla.1875

  2. Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1843–1863, Yanfei Guo and Zhenfeng Zhang

    Version of Record online : 27 AUG 2013, DOI: 10.1002/sec.868

  3. Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.940

  4. On the mobile relay placement in hybrid MANETs with secure network coding

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 738–749, Jin Wang and Kejie Lu

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.775

  5. On cross-correlation properties of S-boxes and their design using semi-bent functions

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 790–800, Enes Pasalic, Samed Bajrić and Milan Djordjević

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1035

  6. Thin domains with doubly oscillatory boundary

    Mathematical Methods in the Applied Sciences

    Volume 37, Issue 2, 30 January 2014, Pages: 158–166, José M. Arrieta and Manuel Villanueva-Pesqueira

    Version of Record online : 27 JUN 2013, DOI: 10.1002/mma.2875

  7. Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 343–359, Cristina Rottondi, Marco Savi, Giacomo Verticale and Christoph Krauß

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.983

  8. Asynchronous fault detection filter design approach for discrete-time switched linear systems

    International Journal of Robust and Nonlinear Control

    Volume 24, Issue 1, 10 January 2014, Pages: 70–96, Jian Li and Guang-Hong Yang

    Version of Record online : 31 JUL 2012, DOI: 10.1002/rnc.2875

  9. Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1974–1987, Mingwu Zhang, Bo Yang, Chunzhi Wang and Tsuyoshi Takagi

    Version of Record online : 18 NOV 2013, DOI: 10.1002/sec.912

  10. Queuing analyses and statistically bounded delay control for two-hop green wireless relay transmissions

    Concurrency and Computation: Practice and Experience

    Volume 25, Issue 9, 25 June 2013, Pages: 1050–1063, Qinghe Du and Chao Zhang

    Version of Record online : 10 JUL 2012, DOI: 10.1002/cpe.2875

  11. A new estimation with minimum trace of asymptotic covariance matrix for incomplete longitudinal data with a surrogate process

    Statistics in Medicine

    Volume 32, Issue 27, 30 November 2013, Pages: 4763–4780, Baojiang Chen and Jing Qin

    Version of Record online : 7 JUN 2013, DOI: 10.1002/sim.5875

  12. On MAC schemes on triangular delaunay meshes, their convergence and application to coupled flow problems

    Numerical Methods for Partial Differential Equations

    Volume 30, Issue 4, July 2014, Pages: 1397–1424, Robert Eymard, Jürgen Fuhrmann and Alexander Linke

    Version of Record online : 9 APR 2014, DOI: 10.1002/num.21875

  13. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1036

  14. One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1796–1809, Dennis Y. W. Liu and Duncan S. Wong

    Version of Record online : 4 JUL 2013, DOI: 10.1002/sec.812

  15. An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 245–260, Lili Xu and Fan Wu

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.977

  16. Authenticated key exchange with synchronized state

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2373–2388, Zheng Yang and Fei Guo

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.948

  17. Signer-admissible strong designated verifier signature from bilinear pairings

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 422–428, Huaqun Wang

    Version of Record online : 14 JUN 2013, DOI: 10.1002/sec.805

  18. Timed-release oblivious transfer

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1138–1149, Lingling Xu, Fangguo Zhang and Shaohua Tang

    Version of Record online : 28 AUG 2013, DOI: 10.1002/sec.845

  19. Efficient oblivious transfer with adaptive queries in UC framework

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2592–2611, Vandana Guleria and Ratna Dutta

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1505

  20. n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 550–564, Zhengan Huang, Shengli Liu and Kefei Chen

    Version of Record online : 4 APR 2014, DOI: 10.1002/sec.1002