Search

Your search keyword '"Fushan WEI"' showing total 32 results

Search Constraints

Start Over You searched for: Author "Fushan WEI" Remove constraint Author: "Fushan WEI" Topic computer security Remove constraint Topic: computer security
32 results on '"Fushan WEI"'

Search Results

1. Automated State-Machine-Based Analysis of Hostname Verification in IPsec Implementations

2. An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles

3. Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities

4. Model Learning and Model Checking of IPSec Implementations for Internet of Things

5. Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of Things

6. Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things

7. Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks

8. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

9. A provably secure password-based anonymous authentication scheme for wireless body area networks

10. An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

11. DOAS: Efficient data owner authorized search over encrypted cloud data

12. VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner

13. VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel

14. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy

15. A New Privacy-Aware Handover Authentication Scheme for Wireless Networks

16. m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting

17. An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model

18. Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks

19. m

20. Two Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks: Formal Model and Secure Construction

22. Gateway-oriented password-authenticated key exchange protocol in the standard model

23. Analysis and improvement of a new authenticated group key agreement in a mobile environment

24. A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques

25. mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA Group

26. A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks

27. Gateway-Oriented Password-Authenticated Key Exchange Based on Chameleon Hash Function

28. Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security

29. Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting

30. Formal Analysis and Improvement of Two-Factor Authenticated Key Exchange Protocol

31. An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings

32. Anonymous gateway-oriented password-based authenticated key exchange based on RSA

Catalog

Books, media, physical & digital resources