Search Results


Revise Search
 
Issue Title
 
Vol 42, No 1 (2013) An Enhanced ID-based Authenticated Multiple Key Agreement Protocol Abstract PDF
Zuowen Tan
 
Vol 41, No 4 (2012) Generation of the Secret Encryption Key Using the Signature of the Embedded System Abstract PDF
Algimantas Venčkauskas, Nerijus Jusas, Irena Mikuckienė, Stasys Maciulevičius
 
Vol 46, No 4 (2017) An Electronic Public Engineering Project Bidding Protocol via a Subliminal Channel Abstract PDF
Chin-Ling Chen, Kun-hao Wang, Chun-Long Fan, Chien-Hung Chen
 
Vol 41, No 3 (2012) A Novel Mutual Authentication Scheme for RFID conforming EPCglobal Class 1 Generation 2 Standards Abstract PDF
Chin Ling Chen, Yu Cheng Huang, Tzay Farn Shih
 
Vol 42, No 2 (2013) Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy Abstract PDF
Wen Chung Kuo, Bae-Ling Chen, Lih-Chyau Wuu
 
Vol 47, No 3 (2018) Security Analysis of a Revocable and Strongly Unforgeable Identity-Based Signature Scheme Abstract PDF
Xiaodong Yang, Tingchun Ma, Ping Yang, Faying An, Caifen Wang
 
Vol 47, No 2 (2018) Leakage-Resilient Certificateless Signature Under Continual Leakage Model Abstract PDF
Jui-Di Wu, Yuh–Min Tseng, Sen-Shan Huang
 
Vol 47, No 4 (2018) An Ontology-based Storage of Security Information Abstract PDF
Igor Kotenko, Andrey Fedorchenko, Elena Doynikova, Andrey Chechulin
 
Vol 47, No 2 (2018) A New Fuzzy Version of the Risk-constrained Cash-in-Transit Vehicle Routing Problem Abstract PDF
Nina Radojičić, Miroslav Marić, Aleksandar Takači
 
Vol 41, No 1 (2012) A MORE SECURE AND EFFICIENT AUTHENTICATION SCHEME WITH ROAMING SERVICE AND USER ANONYMITY FOR MOBILE COMMUNICATIONS Abstract PDF
Chun-Ta Li
 
Vol 45, No 1 (2016) Secure Certificateless Two-Party Key Agreement with Short Message Abstract PDF
Han-Yu Lin
 
Vol 45, No 1 (2016) Identity Based Generalized Proxy Signcryption Scheme Abstract PDF
Cai-Xue Zhou
 
Vol 44, No 2 (2015) A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems Abstract PDF
Wei FuShan, Ma Jianfeng, Ge Aijun, Li Guangsong, Ma Chuangui
 
Vol 48, No 1 (2019) An Authentication Framework for Roaming Service in Global Mobility Networks Abstract PDF
Jangirala Srinivas, Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari, Vandana Guleria
 
Vol 40, No 3 (2011) A Robust Remote User Authentication Scheme Using Smart Card Abstract PDF
Chun-Ta Li, Cheng-Chi Lee
 
Vol 40, No 2 (2011) SECURE SMART CARD BASED PASSWORD AUTHENTICATION SCHEME WITH USER ANONYMITY Abstract PDF
Chun-Ta Li
 
Vol 45, No 2 (2016) Simultaneous and Anonymous Mobile Network Authentication Scheme Based on Chaotic Maps Abstract PDF
Wen Chung Kuo, Chi-Sheng Lin, Chen-Tsun Chuang, Ming-Chih Kao
 
Vol 44, No 2 (2015) An Anonymous and Lightweight Authentication Scheme for Mobile Devices Abstract PDF
Kuo-Hui Yeh
 
Vol 38, No 1 (2009) AN EXTENDED CERTIfiCATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS Abstract PDF
Cheng-Chi Lee, I-En Liao, Min-Shiang Hwang
 
1 - 19 of 19 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"



Print ISSN: 1392-124X 
Online ISSN: 2335-884X