Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleAugust 2016
Secure cryptographic functions via virtualization-based outsourced computing
Concurrency and Computation: Practice & Experience (CCOMP), Volume 28, Issue 11Pages 3149–3163https://doi.org/10.1002/cpe.3706Cryptographic functions, such as encryption/decryption libraries, are common and important tools for applications to enhance confidentiality of the data. However, these functions could be compromised by subtle attacks launched by untrusted operating ...
- articleJuly 2016
Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks
Concurrency and Computation: Practice & Experience (CCOMP), Volume 28, Issue 10Pages 2920–2939https://doi.org/10.1002/cpe.3577Vehicular ad hoc networks VANETs continually produce large scale of data shared among vehicles nearby to improve driving experience and safety. The vehicular communications contain a large amount of private information. It is well known that group key ...
- articleApril 2016
A lightweight key management scheme based on an Adelson-Velskii and Landis tree and elliptic curve cryptography for wireless sensor networks
Concurrency and Computation: Practice & Experience (CCOMP), Volume 28, Issue 6Pages 1831–1847https://doi.org/10.1002/cpe.3153Wireless sensor networks are increasingly used in most varied fields such as environment, health, and military. Often, information transmitted on these networks requires encryption to maintain confidentiality, integrity, and non-repudiation. But ...
- articleMarch 2016
An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing
Concurrency and Computation: Practice & Experience (CCOMP), Volume 28, Issue 4Pages 1083–1093https://doi.org/10.1002/cpe.3521An error-tolerant keyword search scheme permits to make searches on encrypted data with only an approximation of some keyword. The scheme is suitable to the case where users' searching input might not exactly match those pre-set keywords. An error-...
- articleAugust 2015
An efficient protocol for two-party explicit authenticated key agreement
Concurrency and Computation: Practice & Experience (CCOMP), Volume 27, Issue 12Pages 2954–2963https://doi.org/10.1002/cpe.3198Successful and efficient key management plays a critical role toward secured computing and communication systems. Many authenticated key agreement protocols have been proposed to meet the great challenges of information security. The two-party key ...
- articleJuly 2015
Efficient multiple sources network coding signature in the standard model
Concurrency and Computation: Practice & Experience (CCOMP), Volume 27, Issue 10Pages 2616–2636https://doi.org/10.1002/cpe.3322Network coding is a new routing technique that can improve a network's throughput. The key idea is to allow network routers to code the received packets before transmission. However, network coding is vulnerable to pollution attacks where malicious ...
- articleJune 2014
Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption
Concurrency and Computation: Practice & Experience (CCOMP), Volume 26, Issue 8Pages 1506–1519https://doi.org/10.1002/cpe.3021Chosen-ciphertext security has been well-accepted as a standard security notion for public-key encryption. But in a multi-user surrounding, it may not be sufficient, because the adversary may corrupt some users to obtain the random coins as well as the ...
- articleApril 2014
Enabling efficient and secure data sharing in cloud computing
Concurrency and Computation: Practice & Experience (CCOMP), Volume 26, Issue 5Pages 1052–1066https://doi.org/10.1002/cpe.3067With the rapid development of cloud computing, more and more data are being centralized into remote cloud server for sharing, which raises a challenge on how to keep them both private and accessible. Although searchable encryption provides an efficient ...
- articleApril 2014
Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme
Concurrency and Computation: Practice & Experience (CCOMP), Volume 26, Issue 5Pages 1038–1051https://doi.org/10.1002/cpe.3058In 2009, Wu and Lin introduced the concept of self-certified proxy convertible authenticated encryption SP-CAE by integrating self-certified public-key system and designated verifier proxy signature with message recovery. They also presented the first ...
- articleDecember 2012
Efficient signcryption in the standard model
Concurrency and Computation: Practice & Experience (CCOMP), Volume 24, Issue 17Pages 1977–1989https://doi.org/10.1002/cpe.1823Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. The ...
- articleJune 2007
DS/CDMA throughput of a multi-hop sensor network in a Rayleigh fading underwater acoustic channel: Research Articles
Asynchronous half-duplex Direct-Sequence Code-Division Multiple-Access (DS/CDMA) is a suitable candidate for the MAC protocol design of underwater acoustic (UWA) sensor networks owing to its many attractive features. Our ad-hoc multi-hop network is ...
- articleJune 2007
Augmenting Reed–Solomon coding with retransmission for error recovery in 3G video broadcasts: Research Articles
The error-prone nature of the radio channel is the major challenge in servicing video streams over cdma2000 broadcast networks. The MAC protocol for broadcast and multicast services (BCMCS) in cdma2000 specifies forward error correction using Reed–...