|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 26 occurrences of 23 keywords
|
|
|
Results
Found 107 publication records. Showing 107 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
113 | Byoungcheon Lee, Kwangjo Kim |
Self-certified Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 199-214, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
self-certified signature, self-certified key, multi-certification signature, privilege management infrastructure, digital signature, public key infrastructure |
65 | Xiaowen Chu 0001, Yixin Jiang, Chuang Lin 0002, Fujun Feng |
Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 408-417, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Self-certified, roaming services, authentication |
65 | Eun-Jun Yoon, Kee-Young Yoo |
An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOFSEM ![In: SOFSEM 2006: Theory and Practice of Computer Science, 32nd Conference on Current Trends in Theory and Practice of Computer Science, Merín, Czech Republic, January 21-27, 2006, Proceedings, pp. 548-555, 2006, Springer, 3-540-31198-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Self-certified public key, Known plaintext-ciphertext attack, Cryptography, Digital signature, Message recovery |
65 | Qingshui Xue, Fengying Li, Yuan Zhou 0008, Jiping Zhang 0001, Zhenfu Cao, Haifeng Qian |
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSec ![In: Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, pp. 58-70, 2009, Springer, 978-3-642-04433-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
53 | Zuhua Shao |
Self-certified Signatures Based on Discrete Logarithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIFI ![In: Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings, pp. 252-263, 2007, Springer, 978-3-540-73073-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Self-certified public key signature, Discrete logarithm, strong unforgeability |
53 | Yi-Hwa Chen, Jinn-ke Jan |
Enhancement of digital signature with message recovery using self-certified public keys and its variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 39(3), pp. 90-96, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
self-certified public key, authenticated encryption, forward secrecy |
53 | Jiguo Li 0001, Yichen Zhang 0003, Zhijian Wang |
Improvement of Threshold Signature Scheme Using Self-Certified Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (1) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 480-483, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Mourad Debbabi, E. Giasson, Béchir Ktari, Frédéric Michaud, Nadia Tawbi |
Secure Self-Certified COTS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 4-16 June 2000, Gaithersburg, MD, USA, pp. 183-188, 2000, IEEE Computer Society, 0-7695-0798-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
41 | Jianhong Zhang, Hua Chen, Shengnan Gao, Qin Geng |
Comment on a Digital Signature Scheme with Using Self-Certified Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFITA (3) ![In: International Forum on Information Technology and Applications, IFITA 2009, Chengdu, China, 15-17 May 2009, pp. 678-680, 2009, IEEE Computer Society, 978-0-7695-3600-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security anlaysis, self-certified public key, digital signature |
41 | Jianhong Zhang, Hua Chen, Qin Geng |
Efficient and Provably Secure Self-certified Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMT ![In: Active Media Technology, 5th International Conference, AMT 2009, Beijing, China, October 22-24, 2009. Proceedings, pp. 501-512, 2009, Springer, 978-3-642-04874-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Leonardo A. Martucci, Markulf Kohlweiss, Christer Andersson, Andriy Panchenko 0001 |
Self-certified Sybil-free pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 154-159, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, identities, sybil attack |
41 | Qingshui Xue, Zhenfu Cao |
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, Second InternationalSymposium, ISPA 2004, Hong Kong, China, December 13-15, 2004, Proceedings, pp. 715-724, 2004, Springer, 3-540-24128-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Marc Girault |
Self-Certified Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 490-497, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
36 | Jesús Téllez Isaac, José Sierra Camara |
A Secure Payment Protocol for Restricted Connectivity Scenarios in M-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 8th International Conference, EC-Web 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 1-10, 2007, Springer, 978-3-540-74562-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Self-certified public keys, Digital Signature with message recovery, Mobile Payment System, Payment Protocol |
36 | Yixin Jiang, Chuang Lin 0002, Xuemin Shen, Minghui Shi |
Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, pp. 114-125, 2005, Springer, 3-540-25809-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
roaming service, secret-splitting, self-certified, authentication, anonymity, key exchange |
29 | Miguel Viedma Astudillo, Jesús Téllez Isaac, Diego Suarez Touceda, Héctor Plaza López |
Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II, pp. 155-163, 2009, Springer, 978-3-642-02456-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
m-commerce security, mobile devices, E-payment |
29 | Xiaodong Lin 0001, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen |
Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1530-1535, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Youan Xiao |
New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 723-726, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Christer Andersson, Markulf Kohlweiss, Leonardo A. Martucci, Andriy Panchenko 0001 |
A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings, pp. 64-77, 2008, Springer, 978-3-540-79965-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Youan Xiao, Zude Zhou |
A New Kind of Self-Certified Proxy Digital Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 766-769, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Kimmo U. Järvinen, Juha Forsten, Jorma Skyttä |
FPGA Design of Self-certified Signature Verification on Koblitz Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp. 256-271, 2007, Springer, 978-3-540-74734-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Shahrokh Saeednia, Hossein Ghodosi |
A Self-Certified Group-Oriented Cryptosystem Without a Combiner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 192-201, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Xin Zhao, Yuqin Lv, Tet Hin Yeap, Bin Hou |
A Novel Authentication and Key Agreement Scheme for Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM ![In: International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advanced Information Management and Service, IDC 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009, pp. 471-474, 2009, IEEE Computer Society, 978-0-7695-3769-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication and key agreement, ECC-based self-certified public key cryptosystem, wireless mesh networks |
24 | Junzuo Lai, Weidong Kou |
Self-Generated-Certificate Public Key Encryption Without Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 476-489, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography |
17 | Ali Shahidinejad, Jemal H. Abawajy |
Blockchain-Based Self-Certified Key Exchange Protocol for Hybrid Electric Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 70(1), pp. 543-553, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Xiaofeng Lu, Fan Yang, Luwen Zou, Pietro Liò, Pan Hui |
An LTE Authentication and Key Agreement Protocol Based on the ECC Self-Certified Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 31(3), pp. 1101-1116, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Xiaoyu Zhang, Hong Zhong 0001, Jie Cui 0004, Irina Bolodurina, Lu Liu 0001 |
LBVP: A Lightweight Batch Verification Protocol for Fog-Based Vehicular Networks Using Self-Certified Public Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 71(5), pp. 5519-5533, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Chin-Yu Sun, Hsiao-Ling Wu, Hung-Min Sun, TingTing Hwang |
A New Attack for Self-Certified Digital Signatures for E-commerce Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 37(6), pp. 1449-1466, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
17 | Evangelina Lara, Leocundo Aguilar, Jesus A. Garcia |
Lightweight Authentication Protocol Using Self-Certified Public Keys for Wireless Body Area Networks in Health-Care Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 79196-79213, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Yulei Chen, Jianhua Chen 0002 |
Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 80(10), pp. 15291-15313, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | María Pérez-Ortiz 0001, Omar Rivasplata, Emilio Parrado-Hernández, Benjamin Guedj, John Shawe-Taylor |
Progress in Self-Certified Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2111.07737, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
17 | Chien-Hua Tsai, Pin-Chang Su |
A robust secure self-certified concurrent signature scheme from bilinear pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. Arab J. Inf. Technol. ![In: Int. Arab J. Inf. Technol. 18(4), pp. 541-553, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Hongtao Li, Feng Guo, Lili Wang, Jie Wang 0045, Bo Wang, Chuankun Wu |
A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2021, pp. 6623639:1-6623639:10, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Inam ul Haq, Jian Wang 0038, Youwen Zhu |
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 161, pp. 102660, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Bidi Ying, Amiya Nayak |
Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 131, pp. 66-74, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Dariush Abbasinezhad-Mood, Morteza Nikooghadam |
An Anonymous ECC-Based Self-Certified Key Distribution Scheme for the Smart Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Electron. ![In: IEEE Trans. Ind. Electron. 65(10), pp. 7996-8004, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Jianhong Zhang, Xubing Zhao, Weina Zhen |
S2PAD: secure self-certified public auditing for data integrity in cloud storage and its extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Commun. Technol. ![In: Int. J. Inf. Commun. Technol. 12(1/2), pp. 113-130, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Susmita Mandal, Sujata Mohanty, Banshidhar Majhi |
Cryptanalysis and Enhancement of an Anonymous Self-Certified Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 99(2), pp. 863-891, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Shalini Gupta, Abhimanyu Kumar, Nitin Kumar |
Design of ECC based authenticated group key agreement protocol using self-certified public keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAIT ![In: 2018 4th International Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, March 15-17, 2018, pp. 1-5, 2018, IEEE, 978-1-5386-3038-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li |
Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 19(3), pp. 340-346, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
17 | Dao-feng Li, Haiqiang Chen, Cheng Zhong, Taoshen Li, Feng Wang |
A New Self-Certified Signature Scheme Based on NTRUSing for Smart Mobile Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 96(3), pp. 4263-4278, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li |
A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Parallel Process. Lett. ![In: Parallel Process. Lett. 26(4), pp. 1650018:1-1650018:10, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li |
A CAE Scheme Using ECC Based Self Certified PKC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. ![In: J. Comput. Sci. 12(11), pp. 527-533, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Debiao He, Sherali Zeadally, Neeraj Kumar 0001, Wei Wu 0001 |
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 11(9), pp. 2052-2064, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Fan Wu 0003, Lili Xu |
An improved and provable self-certified digital signature scheme with message recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Syst. ![In: Int. J. Commun. Syst. 28(2), pp. 344-357, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Chinyang Henry Tseng, Shiau-Huey Wang, Woei-Jiunn Tsaur |
Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 64(3), pp. 1078-1085, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | SK Hafizul Islam, G. P. Biswas |
Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 82(4), pp. 2727-2750, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Dianli Guo, Qiaoyan Wen, Wenmin Li 0001, Hua Zhang 0001, Zhengping Jin |
A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Medical Syst. ![In: J. Medical Syst. 39(6), pp. 62:1-62:8, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Qi Xie, Guilin Wang, Fubiao Xia, Deren Chen |
Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 26(5), pp. 1038-1051, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | WenBin Hsieh, Jenq-Shiou Leu |
An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 70(1), pp. 133-148, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Tzong-Sun Wu, Yih-Sen Chen, Han-Yu Lin |
Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 8(3), pp. 1157-1177, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Jianhong Zhang, Weina Zeng |
Self-Certified Public Auditing for Data Integrity in Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
3PGCIC ![In: 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Guangdong, China, November 8-10, 2014, pp. 267-273, 2014, IEEE Computer Society, 978-1-4799-4171-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Chien-Lung Hsu, Yu-Hao Chuang, Pei-Ling Tsai |
Design of Proxy Signature Schemes Using Self-Certified Public Keys from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICS ![In: Intelligent Systems and Applications - Proceedings of the International Computer Symposium (ICS) held at Taichung, Taiwan, December 12-14, 2014, pp. 914-924, 2014, IOS Press, 978-1-61499-483-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Dawei Zhao, Haipeng Peng, Shudong Li, Yixian Yang |
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1305.6350, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
17 | Jianhong Zhang, Liying Liu, Yuanbo Cui, Zhipeng Chen |
SP2DAS: Self-certified PKC-Based Privacy-Preserving Data Aggregation Scheme in Smart Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Distributed Sens. Networks ![In: Int. J. Distributed Sens. Networks 9, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Yi-Pin Liao, Chih-Ming Hsiao |
A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 29(3), pp. 886-900, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Zahra Moradlu, Mohammad-Ali Doostari, Mohammed Gharib, Ali Movaghar 0001 |
Fully Distributed Self Certified Key Management for Large-Scale MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC/ATC ![In: 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, UIC/ATC 2013, Vietri sul Mare, Sorrento Peninsula, Italy, December 18-21, 2013, pp. 96-102, 2013, IEEE Computer Society, 978-1-4799-2481-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Qi Xie |
Provably Secure Self-certified Multi-proxy Signature with Message Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Networks ![In: J. Networks 7(10), pp. 1616-1623, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Khaled Hamouid, Kamel Adi |
Self-Certified Based Trust Establishment Scheme in Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NTMS ![In: 5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012, pp. 1-7, 2012, IEEE, 978-1-4673-0229-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Qi Xie, Guilin Wang, Fubiao Xia, Deren Chen |
Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INCoS ![In: 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012, pp. 360-364, 2012, IEEE, 978-1-4673-2279-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao |
On the Security of Self-Certified Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Secur. Priv. ![In: Int. J. Inf. Secur. Priv. 5(2), pp. 54-60, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Nan Li 0007, Yi Mu 0001, Willy Susilo, Fuchun Guo |
Self-certified ring signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011, pp. 396-400, 2011, ACM, 978-1-4503-0564-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Nan Li 0007, Yi Mu 0001, Willy Susilo |
Efficient Self-certified Signatures with Batch Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers, pp. 179-194, 2011, Springer, 978-3-642-34703-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Zhiyang Su, Hao Ma, Xiaojun Zhang, Bei Zhang 0002 |
Secure DHCPv6 that uses RSA authentication integrated with Self-Certified Address. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSS ![In: Third International Workshop on Cyberspace Safety and Security, CSS 2011, Milan, Italy, September 8, 2011, pp. 39-44, 2011, IEEE, 978-1-4577-1033-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Yongming Xie, Guojun Wang 0001 |
Distributed Private-Key Generation Scheme with Self-Certified Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011, pp. 501-508, 2011, IEEE Computer Society, 978-1-4577-2135-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Yi-Pin Liao, Shuenn-Shyang Wang |
A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 33(3), pp. 372-380, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Nader M. Rabadi |
Revised self-certified implicit certificate scheme for anonymous communications in vehicular networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VNC ![In: Proceedings of the Second IEEE Vehicular Networking Conference, VVNC 2010, Jersey City, New Jersey, USA, December 13-15, 2010, pp. 286-292, 2010, IEEE, 978-1-4244-9525-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Zuhua Shao |
Security of self-certified signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 109(20), pp. 1147-1150, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Tzong-Sun Wu, Han-Yu Lin |
Efficient self-certified proxy CAE scheme and its variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 82(6), pp. 974-980, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Han-Yu Lin, Tzong-Sun Wu, Ting-Yu Huang, Yi-Shiung Yeh |
Self-Certified Proxy Convertible Authenticated Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDA (3) ![In: Eighth International Conference on Intelligent Systems Design and Applications, ISDA 2008, 26-28 November 2008, Kaohsiung, Taiwan, 3 Volumes, pp. 479-483, 2008, IEEE Computer Society, 978-0-7695-3382-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Dai-Rui Lin, Chih-I Wang, D. J. Guan |
One/T-Time Signatures Using Self-Certified Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDA (2) ![In: Eighth International Conference on Intelligent Systems Design and Applications, ISDA 2008, 26-28 November 2008, Kaohsiung, Taiwan, 3 Volumes, pp. 608-613, 2008, IEEE Computer Society, 978-0-7695-3382-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Fagen Li, Xiangjun Xin 0002, Yupu Hu |
Key management in ad hoc networks using self-certified public key system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Mob. Commun. ![In: Int. J. Mob. Commun. 5(1), pp. 94-106, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jiguo Li, Shuhong Wang |
New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 4(2), pp. 193-200, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
17 | Willy Susilo, Hiroaki Kikuchi |
Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 4(3), pp. 288-291, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
17 | Zuhua Shao |
Self-certified signature scheme from pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 80(3), pp. 388-395, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Wei-Bin Lee, Kuan-Chieh Liao |
Improved self-certified group-oriented cryptosystem without a combiner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 79(4), pp. 502-506, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Zuhua Shao |
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica ![In: Informatica 17(4), pp. 577-586, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
17 | Zuhua Shao |
Improvement of Threshold Signature Using Self-certified Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 1(1), pp. 24-31, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Haiyong Bao, Zhenfu Cao, Rongxing Lu |
Proxy signature scheme using self-certified public keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 169(2), pp. 1380-1389, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Chwei-Shyong Tsai, Shu-Chen Lin, Min-Shiang Hwang |
Cryptanalysis of an authenticated encryption scheme using self-certified public keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 166(1), pp. 118-122, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Zuhua Shao |
Improvement of efficient proxy signature schemes using self-certified public keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 168(1), pp. 222-234, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Ya-Fen Chang, Chin-Chen Chang 0001, Hui-Feng Huang |
Digital signature with message recovery using self-certified public keys without trustworthy system authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 161(1), pp. 211-227, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Woei-Jiunn Tsaur |
Several security schemes constructed using ECC-based self-certified public key cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 168(1), pp. 447-464, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Chien-Lung Hsu, Tzong-Sun Wu |
Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 164(1), pp. 201-225, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jiqiang Lv, Xinmei Wang, Kwangjo Kim |
Practical convertible authenticated encryption schemes using self-certified public keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 169(2), pp. 1285-1297, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jianhong Zhang, Wei Zou, Dan Chen, Yumin Wang |
On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica (Slovenia) ![In: Informatica (Slovenia) 29(3), pp. 243-346, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | |
Cryptanalysis of improvement of digital signature with message recovery using self-certified public keys and its variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 38, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Haiyong Bao, Zhenfu Cao, Shengbao Wang |
Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 78(1), pp. 56-59, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Ortal Arazi, Hairong Qi 0001 |
Self-certified group key generation for ad hoc clusters in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 14th International Conference On Computer Communications and Networks, ICCCN 2005, October 17-19, 2005, San Diego, California, USA, pp. 359-364, 2005, IEEE, 0-7803-9428-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Guilin Wang |
Universal forgery on a group signature scheme using self-certified public keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 89(5), pp. 227-231, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Shin-Jia Hwang, Yun-Hua Lee |
Repairing ElGamal-like multi-signature schemes using self-certified public keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 156(1), pp. 73-83, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Zuhua Shao |
Improvement of digital signature with message recovery using self-certified public keys and its variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 159(2), pp. 391-399, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Chien-Lung Hsu, Tzong-Sun Wu |
Efficient proxy signature schemes using self-certified public keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 152(3), pp. 807-820, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Yuan Zhou, Zhenfu Cao, Rongxing Lu |
An efficient digital signature using self-certified public keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecu ![In: Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004, pp. 44-47, 2004, ACM. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Shahrokh Saeednia |
A note on Girault's self-certified model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 86(6), pp. 323-327, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Yuh-Min Tseng, Jinn-Ke Jan, Hung-Yu Chien |
Digital signature with message recovery using self-certified public keys and its variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 136(2-3), pp. 203-214, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Tzong-Sun Wu, Chien-Lung Hsu |
Threshold signature scheme using self-certified public keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 67(2), pp. 89-97, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Mourad Debbabi, Josée Desharnais, M. Fourati, E. Menif, Frédéric Painchaud, Nadia Tawbi |
Secure Self-certified Code for Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FASec ![In: Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers, pp. 133-151, 2002, Springer, 3-540-20693-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Shahrokh Saeednia |
A Note on Girault's Self-Certified Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2001, pp. 100, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
17 | Yuh-Shihng Chang, Tzong-Chen Wu, Shih-Chan Huang |
ElGamal-like digital signature and multisignature schemes using self-certified public keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 50(2), pp. 99-105, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 107 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|