Convertible authenticated encryption scheme
Journal of Systems and Software
A Digital Nominative Proxy Signature Scheme for Mobile Communication
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A Secure Agent-Mediated Payment Protocol
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Signcryption based on elliptic curve and its multi-party schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Improved proxy re-encryption schemes with applications to secure distributed storage
ACM Transactions on Information and System Security (TISSEC)
Efficient and Provably Secure Certificateless Multi-receiver Signcryption
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Convertible multi-authenticated encryption scheme with one-way hash function
Computer Communications
On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
An efficient and provable secure identity-based ring signcryption scheme
Computer Standards & Interfaces
On the security of some multi-PKG/multi-recipient signcryption schemes
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Security analysis of two signature schemes and their improved schemes
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Efficient proxy signcryption scheme with provable CCA and CMA security
Computers & Mathematics with Applications
Breaking and building of threshold signcryption schemes
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
A new proxy signcryption scheme using warrants
International Journal of Intelligent Engineering Informatics
An efficient POP protocol based on the signcryption scheme for the WAP PKI
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Security analysis of three cryptographic schemes from other cryptographic schemes
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
An identity-based signcryption scheme with short ciphertext from pairings
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Intelligent anonymous secure e-voting scheme
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Identity-based multi-receiver threshold signcryption scheme
Security and Communication Networks
Efficient identity-based signcryption scheme for multiple receivers
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Provably secure identity-based threshold unsigncryption scheme
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |