Search Results

There are 11220 results for: content related to: Reducing shadow size in smooth scalable secret image sharing

  1. Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.940

  2. An efficient batch verification system and its effect in a real time VANET environment

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 298–310, Jiageng Chen, Mohammad Saiful Islam Mamun and Atsuko Miyaji

    Article first published online : 18 MAR 2014, DOI: 10.1002/sec.980

  3. An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 245–260, Lili Xu and Fan Wu

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.977

  4. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.878

  5. Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 343–359, Cristina Rottondi, Marco Savi, Giacomo Verticale and Christoph Krauß

    Article first published online : 17 MAR 2014, DOI: 10.1002/sec.983

  6. Yet another attack on the chinese remainder theorem-based hierarchical access control scheme

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1079–1095, Niu Liu, Shaohua Tang and Lingling Xu

    Article first published online : 5 JUL 2013, DOI: 10.1002/sec.837

  7. Secure universal designated verifier identity-based signcryption

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 434–444, Changlu Lin, Fei Tang, Pinhui Ke, Lein Harn and Shengyuan Zhang

    Article first published online : 28 JUN 2013, DOI: 10.1002/sec.820

  8. On false data injection attacks against Kalman filtering in power system dynamic state estimation

    Security and Communication Networks

    Qingyu Yang, Liguo Chang and Wei Yu

    Article first published online : 27 AUG 2013, DOI: 10.1002/sec.835

  9. Reliability enhancement for CIR-based physical layer authentication

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 661–671, Jiazi Liu, Ahmed Refaey, Xianbin Wang and Helen Tang

    Article first published online : 7 MAY 2014, DOI: 10.1002/sec.1014

  10. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Article first published online : 26 MAY 2014, DOI: 10.1002/sec.1036

  11. One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Dennis Y.W. Liu and Duncan S. Wong

    Article first published online : 4 JUL 2013, DOI: 10.1002/sec.812

  12. Authenticated key exchange with synchronized state

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2373–2388, Zheng Yang and Fei Guo

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.948

  13. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Article first published online : 7 NOV 2013, DOI: 10.1002/sec.827

  14. n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 550–564, Zhengan Huang, Shengli Liu and Kefei Chen

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1002

  15. Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks

    Security and Communication Networks

    Weiwei Jia, Haojin Zhu, Suguo Du, Xiaolei Dong and Zhenfu Cao

    Article first published online : 17 JAN 2014, DOI: 10.1002/sec.950

  16. PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 418–430, Soumya Maity, Soumya K. Ghosh and Ehab Al-Shaer

    Article first published online : 4 JUL 2014, DOI: 10.1002/sec.990

  17. On cross-correlation properties of S-boxes and their design using semi-bent functions

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 790–800, Enes Pasalic, Samed Bajrić and Milan Djordjević

    Article first published online : 26 MAY 2014, DOI: 10.1002/sec.1035

  18. Vulnerability-constrained multiple minimum cost paths for multi-source wireless sensor networks

    Security and Communication Networks

    Wei An, Song Ci, Haiyan Luo, Yanni Han, Tao Lin, Ding Tang and Ying Qi

    Article first published online : 16 JAN 2014, DOI: 10.1002/sec.932

  19. Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2003–2014, Masoumeh Javanbakht, Hossein Erfani, Hamid Haj Seyyed Javadi and Parisa Daneshjoo

    Article first published online : 10 JAN 2014, DOI: 10.1002/sec.914

  20. Privacy preserving revocable predicate encryption revisited

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 471–485, Kwangsu Lee, Intae Kim and Seong Oun Hwang

    Article first published online : 21 MAR 2014, DOI: 10.1002/sec.994