A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments
Distributed and Parallel Databases - Security of data and transaction processing
Convertible authenticated encryption scheme
Journal of Systems and Software
ISEC '01 Proceedings of the Second International Symposium on Topics in Electronic Commerce
A Secure Agent-Mediated Payment Protocol
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
New Signcryption Schemes Based on KCDSA
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
A Signcryption Scheme Based on Integer Factorization
ISW '00 Proceedings of the Third International Workshop on Information Security
Traceability Schemes for Signed Documents
ISC '02 Proceedings of the 5th International Conference on Information Security
Encrypted Message Authentication by Firewalls
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Formal Proofs for the Security of Signcryption
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A secure method for signature delegation to mobile agents
Proceedings of the 2004 ACM symposium on Applied computing
Proceedings of the 2004 workshop on Multimedia and security
Versatile padding schemes for joint signature and encryption
Proceedings of the 11th ACM conference on Computer and communications security
Robust ID-based threshold signcryption scheme from pairings
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Cryptanalysis of publicly verifiable authenticated encryption
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Signcryption based on elliptic curve and its multi-party schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Signcryption with Non-interactive Non-repudiation
Designs, Codes and Cryptography
Analysis of improved signcryption scheme with key privacy
Information Processing Letters
Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation
Proceedings of the 13th ACM conference on Computer and communications security
On the Security of Tag-KEM for Signcryption
Electronic Notes in Theoretical Computer Science (ENTCS)
Convertible multi-authenticated encryption scheme
Information Sciences: an International Journal
Indentity-based broadcast signcryption
Computer Standards & Interfaces
New ID-based AAA authentication system
ICCOM'07 Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11
An efficient scheme for secure group communication in mobile wireless sensor networks
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Employ a mobile agent for making a payment
Mobile Information Systems
A Convertible Multi-Authenticated Encryption scheme for group communications
Information Sciences: an International Journal
ID-Based (t,n) Threshold Proxy Signcryption for Multi-agent Systems
Computational Intelligence and Security
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
Information Security and Cryptology
Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Identity based signcryption scheme without random oracles
Computer Standards & Interfaces
RSA-TBOS signcryption with proxy re-encryption
Proceedings of the 8th ACM workshop on Digital rights management
A novel identity-based multi-signcryption scheme
Computer Communications
Efficient and Provably Secure Certificateless Multi-receiver Signcryption
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Signcryption Scheme in Multi-user Setting without Random Oracles
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Convertible multi-authenticated encryption scheme with one-way hash function
Computer Communications
On the transferability of private signatures
Information Sciences: an International Journal
Forgery of Provable Secure Short Signcryption Scheme
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
On the Security of Provably Secure Multi-Receiver ID-Based Signcryption Scheme
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Ring signature scheme for ECC-based anonymous signcryption
Computer Standards & Interfaces
A Novel ID-Based Anonymous Signcryption Scheme
APWeb/WAIM '09 Proceedings of the Joint International Conferences on Advances in Data and Web Management
Certificateless Hybrid Signcryption
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Cryptanalysis of Two Ring Signcryption Schemes
Information Security and Cryptology
Efficient Signcryption Key Encapsulation without Random Oracles
Information Security and Cryptology
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks
Information Security and Cryptology
An efficient and provable secure identity-based ring signcryption scheme
Computer Standards & Interfaces
Certificateless signcryption scheme in the standard model
Information Sciences: an International Journal
Distributed signcryption scheme on hyperelliptic curve
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Signcryption from randomness recoverable public key encryption
Information Sciences: an International Journal
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Efficient Constructions of Signcryption Schemes and Signcryption Composability
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Identity Based Aggregate Signcryption Schemes
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
On the security of some multi-PKG/multi-recipient signcryption schemes
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
A pairing-based signcryption scheme using self-certified public keys
International Journal of Computers and Applications
Efficient certificate-based signcryption scheme from bilinear pairings
International Journal of Computers and Applications
Parallel authentication and public-key encryption
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Provably secure encrypt-then-sign composition in hybrid signcryption
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
New DSA-verifiable signcryption schemes
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Concealment and its applications to authenticated encryption
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A WTLS handshake protocol with user anonymity and forward secrecy
CIC'02 Proceedings of the 7th CDMA international conference on Mobile communications
Cryptography after the bubble: how to make an impact on the world
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
An improved semantically-secure identity-based signcryption scheme in the standard model
Computers and Electrical Engineering
Efficient ID-based digital signatures with message recovery
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
On the connection between signcryption and one-pass key establishment
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Secret signatures: how to achieve business privacy efficiently?
WISA'07 Proceedings of the 8th international conference on Information security applications
An interpretation of identity-based cryptography
Foundations of security analysis and design IV
Analysis and improvement of an ID-based anonymous signcryption model
ICIC'09 Proceedings of the 5th international conference on Emerging intelligent computing technology and applications
Security analysis of two signature schemes and their improved schemes
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
An efficient signcryption scheme with key privacy and its extension to ring signcryption
Journal of Computer Security - The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
Provable secure identity based generalized signcryption scheme
Theoretical Computer Science
Efficient proxy signcryption scheme with provable CCA and CMA security
Computers & Mathematics with Applications
An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Threshold attribute-based signcryption
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Journal of Network and Computer Applications
Cryptanalysis of a certificateless signcryption scheme in the standard model
Information Sciences: an International Journal
Identity based public verifiable signcryption scheme
ProvSec'10 Proceedings of the 4th international conference on Provable security
Fully secure threshold unsigncryption
ProvSec'10 Proceedings of the 4th international conference on Provable security
Construction of identity based signcryption schemes
WISA'10 Proceedings of the 11th international conference on Information security applications
One-pass HMQV and asymmetric key-wrapping
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Signcryption with non-interactive non-repudiation without random oracles
Transactions on computational science X
Efficient generic constructions of signcryption with insider security in the multi-user setting
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Digital signature and encryption in a single logical step
CIT'11 Proceedings of the 5th WSEAS international conference on Communications and information technology
Cryptography role in information security
CIT'11 Proceedings of the 5th WSEAS international conference on Communications and information technology
Information security on elliptic curves
CIT'11 Proceedings of the 5th WSEAS international conference on Communications and information technology
A single key pair is adequate for the Zheng signcryption
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Online/offline identity-based signcryption revisited
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
An efficient identity based generalized signcryption scheme
Theoretical Computer Science
Efficient identity-based signcryption in the standard model
ProvSec'11 Proceedings of the 5th international conference on Provable security
Distributed signcryption schemes with formal proof of security
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Identity based online/offline encryption and signcryption schemes revisited
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Identity-based online/offline signcryption for low power devices
Journal of Network and Computer Applications
Efficient short signcryption scheme with public verifiability
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Improved merkle cryptosystem (IMC)
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Efficient ID-based proxy signature and proxy signcryption form bilinear pairings
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
An identity-based threshold signcryption scheme with semantic security
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Secure delegation-by-warrant ID-based proxy signcryption scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Hybrid signcryption schemes with insider security
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
An efficient POP protocol based on the signcryption scheme for the WAP PKI
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Efficient signcryption without random oracles
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
XML-Based digital signature accelerator in open mobile grid computing
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
On the security of a group signcryption scheme from distributed signcryption scheme
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Two proxy signcryption schemes from bilinear pairings
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Constructing secure warrant-based proxy signcryption schemes
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
ID-Based threshold unsigncryption scheme from pairings
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Security analysis of three cryptographic schemes from other cryptographic schemes
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
An identity-based signcryption scheme with short ciphertext from pairings
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
ECGSC: elliptic curve based generalized signcryption
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
XML-signcryption based LBS security protocol acceleration methods in mobile distributed computing
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
XML-based security acceleration methods supporting fast mobile grid
EC-Web'05 Proceedings of the 6th international conference on E-Commerce and Web Technologies
Improved identity-based signcryption
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
LSRP: a lightweight secure routing protocol with low cost for ad-hoc networks
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
A secure mobile agent protocol for AMR systems in home network environments
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
A security acceleration using XML signcryption scheme in mobile grid web services
ICWE'05 Proceedings of the 5th international conference on Web Engineering
One-Way and two-party authenticated ID-Based key agreement protocols using pairing
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
Efficient identity based proxy-signcryption schemes with forward security and public verifiability
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Efficient key distribution protocol for electronic commerce in mobile communications
PARA'04 Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing
Improved signcryption from q-Diffie-Hellman problems
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
On tolerant cryptographic constructions
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Fast and proven secure blind identity-based signcryption from pairings
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Verifiable pairing and its applications
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Hybrid signcryption schemes with outsider security
ISC'05 Proceedings of the 8th international conference on Information Security
Analysis and improvement of a signcryption scheme with key privacy
ISC'05 Proceedings of the 8th international conference on Information Security
Efficient and proactive threshold signcryption
ISC'05 Proceedings of the 8th international conference on Information Security
Dynamic attribute-based signcryption without random oracles
International Journal of Applied Cryptography
Further improvement of an identity-based signcryption scheme in the standard model
Computers and Electrical Engineering
Certificateless KEM and hybrid signcryption schemes revisited
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Confidential signatures and deterministic signcryption
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Secure obfuscation for encrypted signatures
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Building better signcryption schemes with Tag-KEMs
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Efficient and provably secure multi-receiver identity-based signcryption
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Distributed signcryption from pairings
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
A general construction for simultaneous signing and encrypting
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Dynamic attribute-based signcryption without random oracles
International Journal of Applied Cryptography
Multi-receiver identity-based signcryption scheme in the standard model
ICICA'11 Proceedings of the Second international conference on Information Computing and Applications
Identity-Based signcryption from identity-based cryptography
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Secured hierarchical secret sharing using ECC based signcryption
Security and Communication Networks
A biometric identity-based signcryption scheme
Future Generation Computer Systems
Cryptanalysis of an Identity Based Signcryption without Random Oracles
Fundamenta Informaticae
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
A generic construction of accountable decryption and its applications
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Security Pitfalls of the Certificateless Signature and Multi-Receiver Signcryption Schemes
Fundamenta Informaticae
Generic constructions for verifiable signcryption
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Certificate-based signcryption with enhanced security features
Computers & Mathematics with Applications
Efficient signcryption in the standard model
Concurrency and Computation: Practice & Experience
Identity-based multi-receiver threshold signcryption scheme
Security and Communication Networks
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
An efficient signcryption scheme with key privacy
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Universally composable signcryption
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Efficient identity-based signcryption scheme for multiple receivers
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Provably secure identity-based threshold unsigncryption scheme
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
ID based signcryption scheme in standard model
ProvSec'12 Proceedings of the 6th international conference on Provable Security
Reconciling and improving of multi-receiver signcryption protocols with threshold decryption
Security and Communication Networks
Public-Key encryption with lazy parties
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
SMSCrypto: A lightweight cryptographic framework for secure SMS transmission
Journal of Systems and Software
Universal designated verifier signcryption
NSS'12 Proceedings of the 6th international conference on Network and System Security
On security of a certificateless signcryption scheme
Information Sciences: an International Journal
COMPASS: authenticated group key agreement from signcryption
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Efficient online/offline signcryption without key exposure
International Journal of Grid and Utility Computing
Efficient identity-based signcryption without random oracles
AISC '12 Proceedings of the Tenth Australasian Information Security Conference - Volume 125
Efficient communication scheme with confidentiality and privacy for vehicular networks
Computers and Electrical Engineering
A security protocol for information-centric networking in smart grids
Proceedings of the first ACM workshop on Smart energy grid security
Constructing practical signcryption KEM from standard assumptions without random oracles
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Non-delegatable strong designated verifier signature using a trusted third party without pairings
AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
Signcryption schemes with threshold unsigncryption, and applications
Designs, Codes and Cryptography
Provable certificateless generalized signcryption scheme
Designs, Codes and Cryptography
Hi-index | 0.00 |