Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 1 of 40623 results
Sort by: relevance publication year

Cost-Effective Scalable and Anonymous Certificateless Remote Authentication Protocol

Journal Article published Dec 2014 in IEEE Transactions on Information Forensics and Security volume 9 issue 12 on pages 2327 to 2339

Research funded by National Natural Science Foundation of China (61003230, 61300191, 61370026) | Open Fund through the Ministry of Public Security, Key Laboratory of Information Network Security (C14608) | Fundamental Research Funds for the Central Universities (ZYGX2013J073) | Chongqing Key Laboratory of Computer Network and Communication Technology | Fujian Key Laboratory of Network Security and Cryptology

Authors: Hu Xiong

A distributed secret share update scheme with public verifiability for ad hoc network

Journal Article published 15 Sep 2014 in Security and Communication Networks volume 8 issue 8 on pages 1485 to 1493

Research funded by Fundamental Research Funds for the Central Universities (S2013010011859) | National Natural Science Foundation of China (61272435, 61103232 and 61272404) | Research Fund for the Doctoral Program of Higher Education of China (20114404120027)

Authors: Chen Zhenhua, Li Shundong, Wu Qianhong, Huang Qiong

Design and analysis of the covert channel implemented by behaviors of network users

Journal Article published 4 Jul 2016 in Security and Communication Networks volume 9 issue 14 on pages 2359 to 2370

Research funded by National Mobile Communications Research Laboratory, Southeast University (2013D02) | Fundamental Research Funds for the Central Universities (30920130122004) | Natural Science Foundation of Jiangsu Province (BK20131353) | National Natural Science Foundation of China (61271230, 61472190, 61301107)

Authors: Yuwen Qian, Ting Sun, Jun Li, Chang Fan, Huaju Song

A novel membership cloud model-based trust evaluation model for vehicular ad hoc network of T-CPS

Journal Article published Dec 2016 in Security and Communication Networks volume 9 issue 18 on pages 5710 to 5723

Research funded by National Natural Science Foundation of China (61573075) | Chongqing “151” science and technology, China (cstc2013jcsf-zdzxqqX0003) | Fundamental Research Funds for the Central Universities (106112014CDJZR178801)

Authors: Dihua Sun, Hongzhuan Zhao, Senlin Cheng

Research on the Effectiveness Evaluation Model of the Prison Physical Protection System Based on Grey Analytic Hierarchy Process

Journal Article published 2017 in Security and Communication Networks volume 2017 on pages 1 to 9

Research funded by Fundamental Research Funds for the Central Universities (LGZD201602, YB17019)

Authors: Ke Yin

New method of key-dependent message security for asymmetric encryption

Journal Article published 14 Nov 2014 in Security and Communication Networks volume 8 issue 13 on pages 2157 to 2170

Research funded by National Natural Science Foundation of China (61173151, 61173152, 61402353, 61472309, 61303198) | Fundamental Research Funds for the Central Universities (K5051270003)

Authors: Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang, Fenghe Wang

Achieving CCA security from DCCA security more efficiently by using the KEM+DEM hybrid paradigm

Journal Article published 30 Apr 2015 in Security and Communication Networks volume 8 issue 18 on pages 3323 to 3334

Research funded by National Natural Science Foundation of China (61402353, 61373172) | Fundamental Research Funds for the Central Universities (K5051301030)

Authors: Yuan Chen, Qingkuan Dong

Detection of Superpoints Using a Vector Bloom Filter

Journal Article published Mar 2016 in IEEE Transactions on Information Forensics and Security volume 11 issue 3 on pages 514 to 527

Research funded by National Science Foundation for Distinguished Young Scholars of China (61225010) | State Key Program of National Natural Science of China (61432002) | National Natural Science Foundation of China (61272417, 61370187, 61370198, 61300199) | Scientific Research Fund of Liaoning Provincial Education Department (L2013195, 3632010220) | Fundamental Research Funds for the Central Universities (3132014325) | Jiangsu Provincial Key Laboratory of Network and Information Security | Key Laboratory of Computer Network Technology in Jiangsu

Authors: Weijiang Liu, Wenyu Qu, Jian Gong, Keqiu Li

Improved decomposition-based multi-objective cuckoo search algorithm for spectrum allocation in cognitive vehicular network

Journal Article published Jun 2018 in Physical Communication

Research funded by National Natural Science Foundation of China (61402346, 51475347) | International Science&Technology Cooperation Program of China (2015DFA70340) | Fundamental Research Funds for the Central Universities (2017III015)

Authors: Ruining Zhang, Xuemei Jiang, Ruifang Li

A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks

Journal Article published 2016 in Security and Communication Networks on pages n/a to n/a

Research funded by National Natural Science Foundation of China (No.61202352, 61572255 and 61272420) | Natural Science Foundation of Jiangsu Province, China (No.BK20141404) | Fundamental Research Funds for the Central Universities (No. 30915011322)

Authors: Anmin Fu, Jianye Song, Shuai Li, Gongxuan Zhang, Yuqing Zhang