Search Results

There are 2120 results for: content related to: Quality of service-aware and security-aware dynamic spectrum management in cyber-physical surveillance systems for transportation

  1. Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Yanfei Guo and Zhenfeng Zhang

    Article first published online : 27 AUG 2013, DOI: 10.1002/sec.868

  2. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Article first published online : 1 JUN 2015, DOI: 10.1002/sec.1285

  3. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  4. A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2836–2849, Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong and Xiaohua Jia

    Article first published online : 13 FEB 2015, DOI: 10.1002/sec.1208

  5. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Article first published online : 18 MAY 2011, DOI: 10.1002/sec.328

  6. Identity-based signcryption from lattices

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3751–3770, Jianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang and Wenbin Yao

    Article first published online : 23 JUL 2015, DOI: 10.1002/sec.1297

  7. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3356–3371, Zheng Yang, Wu Yang, Lingyun Zhu and Daigu Zhang

    Article first published online : 19 MAY 2015, DOI: 10.1002/sec.1263

  8. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 189–200, Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Article first published online : 22 FEB 2012, DOI: 10.1002/sec.417

  9. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Article first published online : 12 JAN 2015, DOI: 10.1002/sec.1164

  10. Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.940

  11. Authenticated key exchange with synchronized state

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2373–2388, Zheng Yang and Fei Guo

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.948

  12. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  13. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Article first published online : 21 JUN 2012, DOI: 10.1002/sec.566

  14. An enhanced privacy preserving remote user authentication scheme with provable security

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3782–3795, Shehzad Ashraf Chaudhry, Mohammad Sabzinejad Farash, Husnain Naqvi, Saru Kumari and Muhammad Khurram Khan

    Article first published online : 29 JUN 2015, DOI: 10.1002/sec.1299

  15. n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 550–564, Zhengan Huang, Shengli Liu and Kefei Chen

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1002

  16. A more secure and efficient Andrew Secure RPC protocol

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2063–2077, Sirapat Boonkrong

    Article first published online : 14 NOV 2013, DOI: 10.1002/sec.918

  17. New construction of affiliation-hiding authenticated group key agreement

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 723–734, Chang Xu, Hua Guo, Zhoujun Li and Yi Mu

    Article first published online : 29 AUG 2012, DOI: 10.1002/sec.606

  18. Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4157–4176, Y. Sreenivasa Rao and Ratna Dutta

    Article first published online : 26 AUG 2015, DOI: 10.1002/sec.1331

  19. Signcryption KEM/tag-KEM, revisited

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3067–3082, Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng and Yuan Zhou

    Article first published online : 25 MAR 2015, DOI: 10.1002/sec.1232

  20. Efficient revocable certificateless public key encryption with a delegated revocation authority

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3713–3725, Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang

    Article first published online : 15 JUN 2015, DOI: 10.1002/sec.1294