Search Results

There are 9009 results for: content related to: Privacy preserving revocable predicate encryption revisited

  1. Efficient public key encryption with revocable keyword search

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 466–472, Yong Yu, Jianbing Ni, Haomiao Yang, Yi Mu and Willy Susilo

    Version of Record online : 24 MAY 2013, DOI: 10.1002/sec.790

  2. Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.940

  3. Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 343–359, Cristina Rottondi, Marco Savi, Giacomo Verticale and Christoph Krauß

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.983

  4. Privacy-preserving registration protocol for mobile network

    International Journal of Communication Systems

    Volume 27, Issue 10, October 2014, Pages: 1653–1671, He Liu and Mangui Liang

    Version of Record online : 3 SEP 2012, DOI: 10.1002/dac.2426

  5. Privacy preserving protocol for service aggregation in cloud computing

    Software: Practice and Experience

    Volume 42, Issue 4, April 2012, Pages: 467–483, Peishun Wang, Yi Mu, Willy Susilo and Jun Yan

    Version of Record online : 18 OCT 2011, DOI: 10.1002/spe.1129

  6. Privacy-preserving multireceiver ID-based encryption with provable security

    International Journal of Communication Systems

    Volume 27, Issue 7, July 2014, Pages: 1034–1050, Yuh-Min Tseng, Yi-Hung Huang and Hui-Ju Chang

    Version of Record online : 29 JUN 2012, DOI: 10.1002/dac.2395

  7. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1698–1716, Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827

  8. Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 1905–1915, Weiwei Jia, Haojin Zhu, Suguo Du, Xiaolei Dong and Zhenfu Cao

    Version of Record online : 17 JAN 2014, DOI: 10.1002/sec.950

  9. Privacy-preserving framework for geosocial applications

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1764–1779, Lukas Malina and Jan Hajny

    Version of Record online : 31 AUG 2013, DOI: 10.1002/sec.873

  10. Privacy-preserving authentication protocols with efficient verification in VANETs

    International Journal of Communication Systems

    Volume 27, Issue 12, December 2014, Pages: 3676–3692, Jianhong Zhang and Yuwei Xu

    Version of Record online : 24 JUN 2013, DOI: 10.1002/dac.2566

  11. PPGJ: A privacy-preserving general join for outsourced encrypted database

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1232–1244, Sha Ma, Bo Yang and Mingwu Zhang

    Version of Record online : 24 OCT 2013, DOI: 10.1002/sec.854

  12. Distributed access control with adaptive privacy preserving property for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 759–773, Changsha Ma, Kaiping Xue and Peilin Hong

    Version of Record online : 30 APR 2013, DOI: 10.1002/sec.777

  13. Dynamic average consensus under limited control authority and privacy requirements

    International Journal of Robust and Nonlinear Control

    Volume 25, Issue 13, 10 September 2015, Pages: 1941–1966, S. S. Kia, J. Cortés and S. Martínez

    Version of Record online : 30 APR 2014, DOI: 10.1002/rnc.3178

  14. Sensitivity analysis for unmeasured confounding in principal stratification settings with binary variables

    Statistics in Medicine

    Volume 31, Issue 10, 10 May 2012, Pages: 949–962, Scott Schwartz, Fan Li and Jerome P. Reiter

    Version of Record online : 24 FEB 2012, DOI: 10.1002/sim.4472

  15. Howard's algorithm in a phase-field topology optimization approach

    International Journal for Numerical Methods in Engineering

    Volume 94, Issue 1, 6 April 2013, Pages: 43–59, Mathias Wallin and Matti Ristinmaa

    Version of Record online : 28 DEC 2012, DOI: 10.1002/nme.4434

  16. Evaluating accuracy of diagnostic tests with intermediate results in the absence of a gold standard

    Statistics in Medicine

    Volume 32, Issue 15, 10 July 2013, Pages: 2571–2584, Huiping Xu, Michael A. Black and Bruce A. Craig

    Version of Record online : 5 DEC 2012, DOI: 10.1002/sim.5695

  17. Robust fault reconstruction for linear parameter varying systems using sliding mode observers

    International Journal of Robust and Nonlinear Control

    Volume 24, Issue 14, 25 September 2014, Pages: 1947–1968, Halim Alwi and Christopher Edwards

    Version of Record online : 3 MAY 2013, DOI: 10.1002/rnc.3009

  18. A modified scaled boundary finite element method for three-dimensional dynamic soil-structure interaction in layered soil

    International Journal for Numerical Methods in Engineering

    Volume 89, Issue 3, 20 January 2012, Pages: 371–402, C. Birk and R. Behnke

    Version of Record online : 4 AUG 2011, DOI: 10.1002/nme.3251

  19. Certification of projection-based reduced order modelling in computational homogenisation by the constitutive relation error

    International Journal for Numerical Methods in Engineering

    Volume 97, Issue 6, 10 February 2014, Pages: 395–422, P. Kerfriden, J. J. Ródenas and S. P.-A. Bordas

    Version of Record online : 11 OCT 2013, DOI: 10.1002/nme.4588

  20. Robust actuator fault compensation accounting for uncertainty in the fault estimation

    International Journal of Adaptive Control and Signal Processing

    Volume 28, Issue 12, December 2014, Pages: 1440–1453, María M. Seron and José A. De Doná

    Version of Record online : 5 DEC 2013, DOI: 10.1002/acs.2453