Search Results

There are 3016 results for: content related to: An efficient batch verification system and its effect in a real time VANET environment

  1. Authenticated key exchange with entities from different settings and varied groups

    Security and Communication Networks

    Yanfei Guo and Zhenfeng Zhang

    Article first published online : 27 AUG 2013, DOI: 10.1002/sec.868

  2. Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3356–3371, Zheng Yang, Wu Yang, Lingyun Zhu and Daigu Zhang

    Article first published online : 19 MAY 2015, DOI: 10.1002/sec.1263

  3. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Article first published online : 1 JUN 2015, DOI: 10.1002/sec.1285

  4. Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Article first published online : 16 DEC 2013, DOI: 10.1002/sec.940

  5. Security analysis of SM2 key exchange protocol in TPM2.0

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 383–395, Shijun Zhao, Li Xi, Qianying Zhang, Yu Qin and Dengguo Feng

    Article first published online : 17 MAR 2014, DOI: 10.1002/sec.987

  6. Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4157–4176, Y. Sreenivasa Rao and Ratna Dutta

    Article first published online : 26 AUG 2015, DOI: 10.1002/sec.1331

  7. Signcryption KEM/tag-KEM, revisited

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3067–3082, Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng and Yuan Zhou

    Article first published online : 25 MAR 2015, DOI: 10.1002/sec.1232

  8. MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1641–1651, Hongbing Wang, Peng Zeng and Kim-Kwang Raymond Choo

    Article first published online : 19 AUG 2013, DOI: 10.1002/sec.861

  9. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4136–4156, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Article first published online : 27 AUG 2015, DOI: 10.1002/sec.1330

  10. Identity-based signcryption from lattices

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3751–3770, Jianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang and Wenbin Yao

    Article first published online : 23 JUL 2015, DOI: 10.1002/sec.1297

  11. Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2214–2231, SK Hafizul Islam, Muhammad Khurram Khan and Ali M. Al-Khouri

    Article first published online : 14 NOV 2014, DOI: 10.1002/sec.1165

  12. Secure universal designated verifier identity-based signcryption

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 434–444, Changlu Lin, Fei Tang, Pinhui Ke, Lein Harn and Shengyuan Zhang

    Article first published online : 28 JUN 2013, DOI: 10.1002/sec.820

  13. Efficient identity-based broadcast signcryption schemes

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 914–925, Intae Kim and Seong Oun Hwang

    Article first published online : 12 JUL 2013, DOI: 10.1002/sec.802

  14. RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1219–1231, Chen Yuan and Dong Qingkuan

    Article first published online : 1 SEP 2013, DOI: 10.1002/sec.853

  15. New method of key-dependent message security for asymmetric encryption

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2157–2170, Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang and Fenghe Wang

    Article first published online : 14 NOV 2014, DOI: 10.1002/sec.1160

  16. Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3323–3334, Yuan Chen and Qingkuan Dong

    Article first published online : 30 APR 2015, DOI: 10.1002/sec.1256

  17. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Article first published online : 12 JAN 2015, DOI: 10.1002/sec.1164

  18. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 801–810, Kee Sung Kim and Ik Rae Jeong

    Article first published online : 26 MAY 2014, DOI: 10.1002/sec.1036

  19. A provably secure identity-based proxy ring signature based on RSA

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1223–1236, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh and Willy Susilo

    Article first published online : 21 JUL 2014, DOI: 10.1002/sec.1076

  20. One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Dennis Y.W. Liu and Duncan S. Wong

    Article first published online : 4 JUL 2013, DOI: 10.1002/sec.812