Search Results

There are 10537 results for: content related to: Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs

  1. You have full text access to this Open Access content
    Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.940

  2. You have full text access to this Open Access content
    An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 245–260, Lili Xu and Fan Wu

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.977

  3. You have full text access to this Open Access content
    Authenticated key exchange with synchronized state

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2373–2388, Zheng Yang and Fei Guo

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.948

  4. You have full text access to this Open Access content
    Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 343–359, Cristina Rottondi, Marco Savi, Giacomo Verticale and Christoph Krauß

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.983

  5. You have full text access to this Open Access content
    Security analysis of SM2 key exchange protocol in TPM2.0

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 383–395, Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin and Dengguo Feng

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.987

  6. You have full text access to this Open Access content
    A more secure and efficient Andrew Secure RPC protocol

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2063–2077, Sirapat Boonkrong

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.918

  7. You have full text access to this Open Access content
    Large universe decentralized key-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 501–509, Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong and Ximeng Liu

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.997

  8. You have full text access to this Open Access content
    An efficient batch verification system and its effect in a real time VANET environment

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 298–310, Jiageng Chen, Mohammad Saiful Islam Mamun and Atsuko Miyaji

    Version of Record online : 18 MAR 2014, DOI: 10.1002/sec.980

  9. You have full text access to this Open Access content
    Key splitting: making random key distribution schemes resistant against node capture

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 431–445, Mohammad Ehdaie, Nikos Alexiou, Mahmoud Ahmadian Attari, Mohammad Reza Aref and Panos Papadimitratos

    Version of Record online : 31 MAR 2014, DOI: 10.1002/sec.991

  10. You have full text access to this Open Access content
    Preserving identity privacy on multi-owner cloud data during public verification

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2104–2113, Boyang Wang, Hui Li, Xuefeng Liu, Xiaoqing Li and Fenghua Li

    Version of Record online : 10 DEC 2013, DOI: 10.1002/sec.922

  11. You have full text access to this Open Access content
    An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.915

  12. You have full text access to this Open Access content
    Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Version of Record online : 20 FEB 2014, DOI: 10.1002/sec.955

  13. You have full text access to this Open Access content
    Vulnerability-constrained multiple minimum cost paths for multi-source wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 9, June 2016, Pages: 862–873, Wei An, Song Ci, Haiyan Luo, Yanni Han, Tao Lin, Ding Tang and Ying Qi

    Version of Record online : 16 JAN 2014, DOI: 10.1002/sec.932

  14. You have full text access to this Open Access content
    A new multi-use multi-secret sharing scheme based on the duals of minimal linear codes

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 202–211, Yun Song, Zhihui Li, Yongming Li and Jing Li

    Version of Record online : 19 MAR 2014, DOI: 10.1002/sec.972

  15. You have full text access to this Open Access content
    Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1988–2002, Nishant Doshi and Devesh C. Jinwala

    Version of Record online : 15 NOV 2013, DOI: 10.1002/sec.913

  16. You have full text access to this Open Access content
    Efficient centralized approach to prevent from replication attack in wireless sensor networks

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 220–231, Tayeb Kenaza, Othmane Nait Hamoud and Nadia Nouali-Taboudjemat

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.975

  17. You have full text access to this Open Access content
    Security enhancement of the authenticated RFID security mechanism based on chaotic maps

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2356–2372, Mustapha Benssalah, Mustapha Djeddou and Karim Drouiche

    Version of Record online : 16 JAN 2014, DOI: 10.1002/sec.946

  18. You have full text access to this Open Access content
    An integrated detection system against false data injection attacks in the Smart Grid

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 91–109, Wei Yu, David Griffith, Linqiang Ge, Sulabh Bhattarai and Nada Golmie

    Version of Record online : 4 MAR 2014, DOI: 10.1002/sec.957

  19. You have full text access to this Open Access content
    Quality of service-aware and security-aware dynamic spectrum management in cyber-physical surveillance systems for transportation

    Security and Communication Networks

    Volume 9, Issue 9, June 2016, Pages: 850–861, Pengbo Si, Jia Liu, Yanhua Sun and Yanhua Zhang

    Version of Record online : 8 JAN 2014, DOI: 10.1002/sec.928

  20. You have full text access to this Open Access content
    Fair two-party computation with rational parties holding private types

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 284–297, Yilei Wang, Duncan S. Wong, Chuan Zhao and Qiuliang Xu

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.979