Threshold signature scheme using self-certified public keys
Journal of Systems and Software
A note on Girault's self-certified model
Information Processing Letters
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A mobile agent protected scheme using pairing-based cryptosystems
International Journal of Mobile Communications
A pairing-based authentication scheme for protecting multiple mobile agent hosts
AIC'06 Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications
Efficient and Provably Secure Self-certified Signature Scheme
AMT '09 Proceedings of the 5th International Conference on Active Media Technology
Constructing secure mobile-agent-based consumer electronic applications
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Provably secure and efficient authentication techniques for the global mobility network
Journal of Systems and Software
Secure communication for electronic business applications in mobile agent networks
Expert Systems with Applications: An International Journal
Self-certified mutual authentication and key exchange protocol for roaming services
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
On the security of certificateless signature schemes from asiacrypt 2003
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Mutual authentication and key exchange protocols with anonymity property for roaming services
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Certificateless public key encryption without pairing
ISC'05 Proceedings of the 8th international conference on Information Security
On the Security of Self-Certified Public Keys
International Journal of Information Security and Privacy
Hi-index | 0.01 |