Search Results

There are 1579 results for: content related to: Ciphers

  1. Stronger public key encryption system withstanding RAM scraper like attacks

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1650–1662, Sree Vivek Sivanandam, Sharmila Deva Selvi Selvaraj, Akshayaram Srinivasan and Pandu Rangan Chandrasekaran

    Version of Record online : 17 APR 2016, DOI: 10.1002/sec.1454

  2. Privacy-preserving multireceiver ID-based encryption with provable security

    International Journal of Communication Systems

    Volume 27, Issue 7, July 2014, Pages: 1034–1050, Yuh-Min Tseng, Yi-Hung Huang and Hui-Ju Chang

    Version of Record online : 29 JUN 2012, DOI: 10.1002/dac.2395

  3. A collusion attack on asymmetric group key exchange

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2189–2193, Jikai Teng and Chuankun Wu

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1163

  4. Efficient revocable certificateless public key encryption with a delegated revocation authority

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3713–3725, Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang

    Version of Record online : 15 JUN 2015, DOI: 10.1002/sec.1294

  5. Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie–Hellman assumption

    Concurrency and Computation: Practice and Experience

    Volume 26, Issue 8, 10 June 2014, Pages: 1506–1519, Shengli Liu, Fangguo Zhang and Kefei Chen

    Version of Record online : 18 APR 2013, DOI: 10.1002/cpe.3021

  6. Efficient revocable identity-based encryption from multilinear maps

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3511–3522, Xianping Mao, Junzuo Lai, Kefei Chen, Jian Weng and Qixiang Mei

    Version of Record online : 11 MAY 2015, DOI: 10.1002/sec.1274

  7. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 189–200, Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Version of Record online : 22 FEB 2012, DOI: 10.1002/sec.417

  8. CSP-DHIES: a new public-key encryption scheme from matrix conjugation

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 809–822, Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li and Yixian Yang

    Version of Record online : 3 OCT 2011, DOI: 10.1002/sec.376

  9. Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1805–1814, Baocang Wang, Yupu Hu and Xixiang Lv

    Version of Record online : 8 NOV 2013, DOI: 10.1002/sec.881

  10. SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 122–135, Jun Shao, Zhenfu Cao and Peng Liu

    Version of Record online : 6 MAY 2009, DOI: 10.1002/sec.109

  11. AD-ASGKA – authenticated dynamic protocols for asymmetric group key agreement

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1340–1352, Mingchu Li, Xiaodong Xu, Cheng Guo and Xing Tan

    Version of Record online : 26 JAN 2016, DOI: 10.1002/sec.1420

  12. Secure cloud storage using anonymous and blackbox traceable data access control

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4308–4318, Songyang Wu and Yong Zhang

    Version of Record online : 11 SEP 2015, DOI: 10.1002/sec.1343

  13. On the application of generic CCA-secure transformations to proxy re-encryption

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1769–1785, David Nuñez, Isaac Agudo and Javier Lopez

    Version of Record online : 19 FEB 2016, DOI: 10.1002/sec.1434

  14. Secure and efficient data-sharing in clouds

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 8, 10 June 2015, Pages: 2125–2143, Jiang Zhang and Zhenfeng Zhang

    Version of Record online : 14 OCT 2014, DOI: 10.1002/cpe.3395

  15. Leakage-resilient certificate-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3346–3355, Qihong Yu, Jiguo Li and Yichen Zhang

    Version of Record online : 4 MAY 2015, DOI: 10.1002/sec.1258

  16. An improved anonymous multi-receiver identity-based encryption scheme

    International Journal of Communication Systems

    Volume 28, Issue 4, 10 March 2015, Pages: 645–658, Jianhong Zhang and Jian Mao

    Version of Record online : 18 NOV 2013, DOI: 10.1002/dac.2693

  17. Revocable and anonymous searchable encryption in multi-user setting

    Concurrency and Computation: Practice and Experience

    Volume 28, Issue 4, 25 March 2016, Pages: 1204–1218, Yinbin Miao, Jianfeng Ma and Zhiquan Liu

    Version of Record online : 7 OCT 2015, DOI: 10.1002/cpe.3608

  18. A novel one-to-many and many-to-one asymmetric encryption model and its algorithms

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3906–3913, Run-hua Shi, Hong Zhong, Jie Cui and Shun Zhang

    Version of Record online : 14 JUL 2015, DOI: 10.1002/sec.1309

  19. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Version of Record online : 24 FEB 2012, DOI: 10.1002/sec.509

  20. A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 8, 10 June 2015, Pages: 2004–2027, Kaitai Liang, Liming Fang, Duncan S. Wong and Willy Susilo

    Version of Record online : 13 OCT 2014, DOI: 10.1002/cpe.3397