Search Results

There are 23079 results for: content related to: Ciphers

  1. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Article first published online : 12 JAN 2015, DOI: 10.1002/sec.1164

  2. Encryption

    Standard Article

    The Internet Encyclopedia

    Ari Juels

    Published Online : 15 APR 2004, DOI: 10.1002/047148296X.tie058

  3. A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 8, 10 June 2015, Pages: 2004–2027, Kaitai Liang, Liming Fang, Duncan S. Wong and Willy Susilo

    Article first published online : 13 OCT 2014, DOI: 10.1002/cpe.3397

  4. Identity-based multi-receiver threshold signcryption scheme

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1331–1337, Huawang Qin, Yuewei Dai and Zhiquan Wang

    Article first published online : 5 NOV 2010, DOI: 10.1002/sec.259

  5. SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 122–135, Jun Shao, Zhenfu Cao and Peng Liu

    Article first published online : 6 MAY 2009, DOI: 10.1002/sec.109

  6. Attacks on a lightweight cipher based on a multiple recursive generator

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 601–607, Lu Xiao and Gregory G. Rose

    Article first published online : 25 JAN 2010, DOI: 10.1002/sec.189

  7. Symmetric Block Ciphers

    Wireless Mobile Internet Security, Second Edition

    Man Young Rhee, Pages: 81–160, 2013

    Published Online : 25 MAR 2013, DOI: 10.1002/9781118512920.ch4

  8. Energy efficiency of encryption schemes applied to wireless sensor networks

    Security and Communication Networks

    Volume 5, Issue 7, July 2012, Pages: 789–808, Xueying Zhang, Howard M. Heys and Cheng Li

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.375

  9. Privacy preserving revocable predicate encryption revisited

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 471–485, Kwangsu Lee, Intae Kim and Seong Oun Hwang

    Article first published online : 21 MAR 2014, DOI: 10.1002/sec.994

  10. A secure cryptosystem based on affine transformation

    Security and Communication Networks

    Volume 4, Issue 2, February 2011, Pages: 207–215, Mohsen Toorani and Abolfazl Falahati

    Article first published online : 14 SEP 2009, DOI: 10.1002/sec.137

  11. Secure and efficient data-sharing in clouds

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 8, 10 June 2015, Pages: 2125–2143, Jiang Zhang and Zhenfeng Zhang

    Article first published online : 14 OCT 2014, DOI: 10.1002/cpe.3395

  12. Protect biometric data with compound chaotic encryption

    Security and Communication Networks

    Charles Z. Liew, Raymond Shaw and Lanlan Li

    Article first published online : 15 AUG 2014, DOI: 10.1002/sec.1070

  13. Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1988–2002, Nishant Doshi and Devesh C. Jinwala

    Article first published online : 15 NOV 2013, DOI: 10.1002/sec.913

  14. A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID

    Wireless Communications and Mobile Computing

    Volume 11, Issue 2, February 2011, Pages: 254–266, Alina Olteanu, Yang Xiao, Fei Hu, Bo Sun and Hongmei Deng

    Article first published online : 1 JUL 2010, DOI: 10.1002/wcm.988

  15. A novel one-to-many and many-to-one asymmetric encryption model and its algorithms

    Security and Communication Networks

    Run-hua Shi, Hong Zhong, Jie Cui and Shun Zhang

    Article first published online : 14 JUL 2015, DOI: 10.1002/sec.1309

  16. Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 672–681, Zhiqiang Liu, Ya Liu, Qingju Wang, Dawu Gu and Wei Li

    Article first published online : 5 MAY 2014, DOI: 10.1002/sec.1015

  17. A secure re-encryption scheme for data services in a cloud computing environment

    Concurrency and Computation: Practice and Experience

    Lizhi Xiong, Zhengquan Xu and Yanyan Xu

    Article first published online : 23 JAN 2015, DOI: 10.1002/cpe.3423

  18. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Article first published online : 24 FEB 2012, DOI: 10.1002/sec.509

  19. On the security of a lightweight authentication and encryption scheme for mobile ad hoc network

    Security and Communication Networks

    Wun-She Yap, Joseph K. Liu, Syh-Yuan Tan and Bok-Min Goi

    Article first published online : 10 FEB 2015, DOI: 10.1002/sec.1234

  20. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Article first published online : 22 FEB 2012, DOI: 10.1002/sec.417