Search Results

There are 5627863 results for: content related to: Call for papers: systematic network optimizations for security parameters (security and communication networks)

  1. An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1921–1932, Saru Kumari, Mridul K. Gupta, Muhammad Khurram Khan and Xiong Li

    Version of Record online : 13 NOV 2013, DOI: 10.1002/sec.906

  2. A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 261–283, Mostafa Mohammadpourfard, Mohammad Ali Doostari, Mohammad Bagher Ghaznavi Ghoushchi and Nafiseh Shakiba

    Version of Record online : 12 MAR 2014, DOI: 10.1002/sec.978

  3. A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1860–1871, Lu Leng, Andrew Beng Jin Teoh, Ming Li and Muhammad Khurram Khan

    Version of Record online : 12 NOV 2013, DOI: 10.1002/sec.900

  4. A flexible hierarchical access control mechanism enforcing extension policies

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 189–201, Ya-Fen Chang

    Version of Record online : 4 MAR 2014, DOI: 10.1002/sec.971

  5. The design of authentication key protocol in certificate-free public key cryptosystem

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2125–2133, Yu-Fang Chung

    Version of Record online : 10 DEC 2013, DOI: 10.1002/sec.924

  6. Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 149–158, Fahad T. Bin Muhaya

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.967

  7. Certificateless online/offline signcryption scheme

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 1979–1990, Jiguo Li, Jingjing Zhao and Yichen Zhang

    Version of Record online : 21 DEC 2014, DOI: 10.1002/sec.1146

  8. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.911

  9. Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2405–2411, Liping Zhang, Shanyu Tang and Zhihua Cai

    Version of Record online : 17 JAN 2014, DOI: 10.1002/sec.951

  10. Enhanced name and vote separated E-voting system: an E-voting system that ensures voter confidentiality and candidate privacy

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2335–2344, Haijun Pan, Edwin Hou and Nirwan Ansari

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.944

  11. Simulatable and secure certificate-based threshold signature without pairings

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2094–2103, Feng Wang, Chin-Chen Chang and Lein Harn

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.921

  12. Robust three-factor remote user authentication scheme with key agreement for multimedia systems

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 1916–1927, Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Junguo Liao and Xiaoke Zhao

    Version of Record online : 5 MAR 2014, DOI: 10.1002/sec.961

  13. Known-plaintext attack on secure kNN computation on encrypted databases

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2432–2441, Gu Chunsheng and Gu Jixing

    Version of Record online : 17 JAN 2014, DOI: 10.1002/sec.954

  14. Enhancement on strongly secure group key agreement

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 126–135, Yuh-Min Tseng, Tung-Tso Tsai and Sen-Shan Huang

    Version of Record online : 19 FEB 2014, DOI: 10.1002/sec.964

  15. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  16. More secure smart card-based remote user password authentication scheme with user anonymity

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2039–2053, Saru Kumari and Muhammad Khurram Khan

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.916

  17. A new secure and efficient scheme for network mobility management

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1360–1377, Salima Smaoui, Mohammad S. Obaidat, Faouzi Zarai and K. F. Hsiao

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1090

  18. A multilayer non-repudiation system: a Suite-B approach

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1698–1706, Sasan Adibi

    Version of Record online : 29 SEP 2014, DOI: 10.1002/sec.1117

  19. Modeling, conflict detection, and verification of a new virtualization role-based access control framework

    Security and Communication Networks

    Volume 8, Issue 10, 10 July 2015, Pages: 1904–1925, Yang Luo, Chunhe Xia, Liangshuang Lv, Zhao Wei and Yazhuo Li

    Version of Record online : 23 JUN 2014, DOI: 10.1002/sec.1025

  20. A novel image steganography scheme based on morphological associative memory and permutation schema

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 110–121, Sara Nazari, Amir-Masoud Eftekhari-Moghadam and Mohammad-Shahram Moin

    Version of Record online : 12 FEB 2014, DOI: 10.1002/sec.962