New Signcryption Schemes Based on KCDSA
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Encrypted Message Authentication by Firewalls
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
A secure method for signature delegation to mobile agents
Proceedings of the 2004 ACM symposium on Applied computing
Signcryption with Non-interactive Non-repudiation
Designs, Codes and Cryptography
Indentity-based broadcast signcryption
Computer Standards & Interfaces
A Convertible Multi-Authenticated Encryption scheme for group communications
Information Sciences: an International Journal
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
Information Security and Cryptology
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
RSA-TBOS signcryption with proxy re-encryption
Proceedings of the 8th ACM workshop on Digital rights management
Ring signature scheme for ECC-based anonymous signcryption
Computer Standards & Interfaces
Signcryption from randomness recoverable public key encryption
Information Sciences: an International Journal
A pairing-based signcryption scheme using self-certified public keys
International Journal of Computers and Applications
Efficient certificate-based signcryption scheme from bilinear pairings
International Journal of Computers and Applications
New DSA-verifiable signcryption schemes
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
A WTLS handshake protocol with user anonymity and forward secrecy
CIC'02 Proceedings of the 7th CDMA international conference on Mobile communications
Efficient ID-based digital signatures with message recovery
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Secret signatures: how to achieve business privacy efficiently?
WISA'07 Proceedings of the 8th international conference on Information security applications
Analysis and improvement of an ID-based anonymous signcryption model
ICIC'09 Proceedings of the 5th international conference on Emerging intelligent computing technology and applications
An efficient signcryption scheme with key privacy and its extension to ring signcryption
Journal of Computer Security - The 2007 European PKI Workshop: Theory and Practice (EuroPKI'07)
Provable secure identity based generalized signcryption scheme
Theoretical Computer Science
Efficient proxy signcryption scheme with provable CCA and CMA security
Computers & Mathematics with Applications
Threshold attribute-based signcryption
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Identity based public verifiable signcryption scheme
ProvSec'10 Proceedings of the 4th international conference on Provable security
Fully secure threshold unsigncryption
ProvSec'10 Proceedings of the 4th international conference on Provable security
Breaking and building of threshold signcryption schemes
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Signcryption with non-interactive non-repudiation without random oracles
Transactions on computational science X
An efficient identity based generalized signcryption scheme
Theoretical Computer Science
Efficient identity-based signcryption in the standard model
ProvSec'11 Proceedings of the 5th international conference on Provable security
Efficient short signcryption scheme with public verifiability
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Efficient ID-based proxy signature and proxy signcryption form bilinear pairings
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
On the security of a group signcryption scheme from distributed signcryption scheme
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Two proxy signcryption schemes from bilinear pairings
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Constructing secure warrant-based proxy signcryption schemes
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
ID-Based threshold unsigncryption scheme from pairings
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
ECGSC: elliptic curve based generalized signcryption
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
XML-signcryption based LBS security protocol acceleration methods in mobile distributed computing
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
XML-based security acceleration methods supporting fast mobile grid
EC-Web'05 Proceedings of the 6th international conference on E-Commerce and Web Technologies
Improved signcryption from q-Diffie-Hellman problems
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Analysis and improvement of a signcryption scheme with key privacy
ISC'05 Proceedings of the 8th international conference on Information Security
Efficient and proactive threshold signcryption
ISC'05 Proceedings of the 8th international conference on Information Security
Dynamic attribute-based signcryption without random oracles
International Journal of Applied Cryptography
A general construction for simultaneous signing and encrypting
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Dynamic attribute-based signcryption without random oracles
International Journal of Applied Cryptography
A generic construction of accountable decryption and its applications
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Generic constructions for verifiable signcryption
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Certificate-based signcryption with enhanced security features
Computers & Mathematics with Applications
Efficient signcryption in the standard model
Concurrency and Computation: Practice & Experience
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
An efficient signcryption scheme with key privacy
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Efficient identity-based signcryption scheme for multiple receivers
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Provably secure identity-based threshold unsigncryption scheme
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |