Generalization of Elliptic Curve Digital Signature Schemes
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Versatile padding schemes for joint signature and encryption
Proceedings of the 11th ACM conference on Computer and communications security
Signcryption based on elliptic curve and its multi-party schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Ring signature scheme for ECC-based anonymous signcryption
Computer Standards & Interfaces
Distributed signcryption scheme on hyperelliptic curve
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
On the security of some multi-PKG/multi-recipient signcryption schemes
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
A pairing-based signcryption scheme using self-certified public keys
International Journal of Computers and Applications
A practical way to provide perfect forward secrecy for secure e-mail protocols
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Security analysis of two signature schemes and their improved schemes
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Provable secure identity based generalized signcryption scheme
Theoretical Computer Science
Elliptic curve cryptography: survey and its security applications
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
An efficient identity based generalized signcryption scheme
Theoretical Computer Science
A secure key management framework for heterogeneous wireless sensor networks
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
ECGSC: elliptic curve based generalized signcryption
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Secured hierarchical secret sharing using ECC based signcryption
Security and Communication Networks
Cryptanalysis of an Identity Based Signcryption without Random Oracles
Fundamenta Informaticae
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Efficient identity-based signcryption scheme for multiple receivers
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Provably secure identity-based threshold unsigncryption scheme
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
On security of a certificateless signcryption scheme
Information Sciences: an International Journal
Hi-index | 0.90 |