The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Signcryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2002 (19) 2003 (16) 2004 (20) 2005 (38) 2006 (21) 2007 (22) 2008 (41) 2009 (45) 2010 (58) 2011 (39) 2012 (40) 2013 (35) 2014 (33) 2015 (46) 2016 (29) 2017 (50) 2018 (45) 2019 (42) 2020 (55) 2021 (54) 2022 (54) 2023 (56) 2024 (20)
Publication types (Num. hits)
article(557) book(1) incollection(15) inproceedings(303) phdthesis(2)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 182 occurrences of 72 keywords

Results
Found 878 publication records. Showing 878 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Y. Sreenivasa Rao, Ratna Dutta Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Tapas Pandit, Sumit Kumar Pandey, Rana Barua Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Shingo Hasegawa, Shuji Isobe On the security notions of signcryption. Search on Bibsonomy ISITA The full citation details ... 2014 DBLP  BibTeX  RDF
15Y. Sreenivasa Rao, Ratna Dutta Expressive Attribute Based Signcryption with Constant-Size Ciphertext. Search on Bibsonomy AFRICACRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Caixue Zhou Provably Secure and Efficient Multi-receiver Identity-Based Generalized Signcryption Scheme. Search on Bibsonomy AsiaJCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Wei Zhang 0116 Improvements and generalisations of signcryption schemes. Search on Bibsonomy 2014   RDF
15Fei Yan, Xiaofeng Chen 0001, Yinghui Zhang 0002 Efficient online/offline signcryption without key exposure. Search on Bibsonomy Int. J. Grid Util. Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Lunzhi Deng, Chenglian Liu, Xiangbin Wang An Improved Identity-Based Ring Signcryption Scheme. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Liaojun Pang, Huixian Li nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness. Search on Bibsonomy Comput. Informatics The full citation details ... 2013 DBLP  BibTeX  RDF
15Fagen Li, Fahad Bin Muhaya, Muhammad Khurram Khan, Tsuyoshi Takagi Lattice-based signcryption. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Huiyan Chen, Yong Li 0002, Jinping Ren A Practical Identity-based Signcryption Scheme. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2013 DBLP  BibTeX  RDF
15Hu Xiong, Jian-bin Hu, Zhong Chen 0001 Security Flaw of an ECC-based Signcryption Scheme with Anonymity. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2013 DBLP  BibTeX  RDF
15Songqin Miao, Futai Zhang, Sujuan Li, Yi Mu 0001 On security of a certificateless signcryption scheme. Search on Bibsonomy Inf. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Qing Ye, Hongfu Guo, Chunli Yang, Wenji Li Improved Fair Exchange Protocol Based on Signcryption-Based Concurrent Signature. Search on Bibsonomy J. Softw. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Jia Fan, Yuliang Zheng 0001, Xiaohu Tang Key-Insulated Signcryption. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Xiaotong Fu, Wen Liu, Ruijun Shi Designated verifier ring signature and ring signcryption. Search on Bibsonomy Int. J. Intell. Inf. Database Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Fagen Li, Hui Zhang, Tsuyoshi Takagi Efficient Signcryption for Heterogeneous Systems. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Chunqiang Hu, Nan Zhang 0004, Hongjuan Li, Xiuzhen Cheng 0001, Xiaofeng Liao 0001 Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Lize Gu, Yun Pan, Mianxiong Dong, Kaoru Ota Noncommutative Lightweight Signcryption for Wireless Sensor Networks. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Zhenzhou Guo, Mingchu Li, Xinxin Fan Attribute-based ring signcryption scheme. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Jayaprakash Kar Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
15Yang Wang 0074, Mark Manulis, Man Ho Au, Willy Susilo Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
15Fagen Li, Tsuyoshi Takagi Secure identity-based signcryption in the standard model. Search on Bibsonomy Math. Comput. Model. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Fagen Li, Masaaki Shirase, Tsuyoshi Takagi Certificateless hybrid signcryption. Search on Bibsonomy Math. Comput. Model. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Xiangxue Li, Haifeng Qian, Jian Weng 0001, Yu Yu 0001 Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Search on Bibsonomy Math. Comput. Model. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Sujata Mohanty, Banshidhar Majhi, Subhalaxmi Das A secure electronic cash based on a certificateless group signcryption scheme. Search on Bibsonomy Math. Comput. Model. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Ming Luo 0006, Donghua Huang, Jun Hu An Efficient Biometric Certificateless Signcryption Scheme. Search on Bibsonomy J. Comput. The full citation details ... 2013 DBLP  BibTeX  RDF
15Yinghui Zhang 0002, Xiaofeng Chen 0001, Hui Li 0006 Key-Evolving Hierarchical ID-Based Signcryption. Search on Bibsonomy Comput. J. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15G. Swapna, Punugu Vasudeva Reddy, Thumbur Gowri Efficient identity based multi-proxy multi-signcryption scheme using bilinear pairings over elliptic curves. Search on Bibsonomy ICACCI The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Xiangxue Li, Haifeng Qian, Yu Yu 0001, Yuan Zhou 0008, Jian Weng 0001 Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Angsuman Das, Avishek Adhikari Signcryption from Randomness Recoverable PKE Revisited. Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Heba Kamal Aslan, Mohamed Rasslan A new multicast authentication protocol using erasure code functions and signcryption techniques. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Yang Wang 0074, Mark Manulis, Man Ho Au, Willy Susilo Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Rintaro Nakano, Junji Shikata Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Hui Cui 0001, Yi Mu 0001, Man Ho Au Anonymous Signcryption against Linear Related-Key Attacks. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Fei Tang, Changlu Lin, Hongda Li 0001 ID-Based Signcryption with Restrictive Unsigncryption. Search on Bibsonomy INCoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Xiaotong Fu, Xiaowei Li, Wen Liu IDPKC-to-TPKC Construction of Multi-receiver Signcryption. Search on Bibsonomy INCoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Chang-Ji Wang, Jia-Sen Huang, Wen-Long Lin, Hai-Tao Lin Security Analysis of Gagne et al.'s Threshold Attribute-Based Signcryption Scheme. Search on Bibsonomy INCoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Yiliang Han, Wanyi Lu, Xiaoyuan Yang 0002 Attribute-Based Signcryption Scheme with Non-monotonic Access Structure. Search on Bibsonomy INCoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Xiangxue Li, Haifeng Qian, Yu Yu 0001, Jian Weng 0001, Yuan Zhou 0008 Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model. Search on Bibsonomy ICICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng A Revocable ID-based Signcryption Scheme. Search on Bibsonomy J. Inf. Hiding Multim. Signal Process. The full citation details ... 2012 DBLP  BibTeX  RDF
15Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman Dynamic attribute-based signcryption without random oracles. Search on Bibsonomy Int. J. Appl. Cryptogr. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2012 DBLP  BibTeX  RDF
15Fagen Li, Mingwu Zhang, Tsuyoshi Takagi Efficient signcryption in the standard model. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Ming Luo, Chun-hua Zou, Jianfeng Xu An Efficient Identity-based Broadcast Signcryption Scheme. Search on Bibsonomy J. Softw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15S. Sree Vivek, S. Sharmila Deva Selvi, Salini Selvaraj Kowsalya, C. Pandu Rangan PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction. Search on Bibsonomy J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Faezeh Sadat Babamir, Ziba Eslami Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Xixiang Lv, Hui Li 0006 Group Key Agreement From Signcryption. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Jiguo Li 0001, Xinyi Huang, Meixue Hong, Yichen Zhang 0003 Certificate-based signcryption with enhanced security features. Search on Bibsonomy Comput. Math. Appl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi Further improvement of an identity-based signcryption scheme in the standard model. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Taek-Young Youn, Dowon Hong Signcryption with fast online signing and short signcryptext for secure and private mobile communication. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Laura Savu Signcryption scheme based on schnorr digital signature Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
15Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi Identity-based online/offline signcryption for low power devices. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Fagen Li, Muhammad Khurram Khan A biometric identity-based signcryption scheme. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Atanu Basu, Indranil Sengupta 0001, Jamuna Kanta Sing Secured hierarchical secret sharing using ECC based signcryption. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Mingwu Zhang, Bo Yang 0003, Tsuyoshi Takagi Reconciling and improving of multi-receiver signcryption protocols with threshold decryption. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan On Provably Secure Code-Based Signature and Signcryption Scheme. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
15Jayaprakash Kar An Efficient Signcryption Scheme from q-Diffie-Hellman Problems. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
15Alexander W. Dent Aggregate Signcryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
15Cai-xue Zhou Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
15Graham Enos, Yuliang Zheng 0001 An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
15S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan ID Based Signcryption Scheme in Standard Model. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
15Sujata Mohanty, Banshidhar Majhi A Strong Designated Verifiable DL Based Signcryption Scheme. Search on Bibsonomy J. Inf. Process. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Wei Yuan, Liang Hu 0001, Hongtu Li, Jianfeng Chu, Yuyu Sun Analysis and Enhancement of Three Identity-based Signcryption Protocols. Search on Bibsonomy J. Comput. The full citation details ... 2012 DBLP  BibTeX  RDF
15Wei Yuan, Liang Hu 0001, Hongtu Li, Jianfeng Chu, Hui Wang Cryptanalysis and Improvement of an ID-Based Threshold Signcryption Scheme. Search on Bibsonomy J. Comput. The full citation details ... 2012 DBLP  BibTeX  RDF
15Jianhong Chen, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long 0001, Zhongmei Wan Identity-Based Key-Insulated Signcryption. Search on Bibsonomy Informatica The full citation details ... 2012 DBLP  BibTeX  RDF
15Prashant Kumar Mishra, Kunwar Singh, Sudhanshu Baruntar ID-Based Threshold Signcryption and Group Unsigncryption. Search on Bibsonomy SNDS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Gaurav Sharma 0006, Suman Bala, Anil K. Verma 0001 An Identity-Based Ring Signcryption Scheme. Search on Bibsonomy ICITCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Suman Bala, Gaurav Sharma 0006, Anil K. Verma 0001 An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks. Search on Bibsonomy ICITCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Peter Hyun-Jeen Lee, Udaya Parampalli, Shivaramakrishnan Narayan E cient Identity-based Signcryption without Random Oracles. Search on Bibsonomy AISC The full citation details ... 2012 DBLP  BibTeX  RDF
15Nick Mailloux, Ali Miri, Monica Nevins COMPASS: Authenticated Group Key Agreement from Signcryption. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Fei Tang, Changlu Lin, Pinhui Ke Universal Designated Verifier Signcryption. Search on Bibsonomy NSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Shehzad Ashraf Chaudhry, Nizamuddin, Muhammad Sher Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve Cryptosystem. Search on Bibsonomy ICISTM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Alka Aman, Rajeev G. Vishwakarma Secure message authentication using true random number generator based on Signcryption scheme using ECC. Search on Bibsonomy CCSEIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Huaqun Wang, Yuqing Zhang 0001, Bo Qin Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Ruhma Tahir, Klaus D. McDonald-Maier An ICMetrics Based Lightweight Security Architecture Using Lattice Signcryption. Search on Bibsonomy EST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan ID Based Signcryption Scheme in Standard Model. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Bo Qin, Huaqun Wang, Qianhong Wu, Jianwei Liu 0001, Josep Domingo-Ferrer A New Identity Based Signcryption Scheme in the Standard Model. Search on Bibsonomy INCoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Xiaotong Fu, Wen Liu Constructing Designated-Verifier Ring Signature and Ring Signcryption under the k-CCA2 Assumption. Search on Bibsonomy INCoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Yevgeniy Dodis Signcryption. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Kyungah Shim, Young-Ran Lee Security Pitfalls of the Certificateless Signature and Multi-Receiver Signcryption Schemes. Search on Bibsonomy Fundam. Informaticae The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Hu Xiong, Zhiguang Qin, Fagen Li Cryptanalysis of an Identity Based Signcryption without Random Oracles. Search on Bibsonomy Fundam. Informaticae The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Zhong Xu, Ruiping Ma, Shuai Liu, Wenbo He EISM: An Efficient ID-based Signcryption Scheme for Multi-PKG Multihop Wireless Networks of Mobile Hosts. Search on Bibsonomy Ad Hoc Sens. Wirel. Networks The full citation details ... 2011 DBLP  BibTeX  RDF
15Jian Weng 0001, Guoxiang Yao, Robert H. Deng, Min-Rong Chen, Xiangxue Li Cryptanalysis of a certificateless signcryption scheme in the standard model. Search on Bibsonomy Inf. Sci. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Fagen Li, Yongjian Liao, Zhiguang Qin Analysis of an Identity-Based Signcryption Scheme in the Standard Model. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Prashant Kushwah, Sunder Lal An efficient identity based generalized signcryption scheme. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Sumit Kumar Pandey, Rana Barua Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes. Search on Bibsonomy J. Internet Serv. Inf. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Xuanwu Zhou, Zhigang Jin, Yan Fu, Huaiwei Zhou, Lianmin Qin Short Signcryption Scheme for the Internet of Things. Search on Bibsonomy Informatica (Slovenia) The full citation details ... 2011 DBLP  BibTeX  RDF
15Gang Yu, Hongzhi Yang, Shuqin Fan, Yong Shen, Wenbao Han Efficient Certificateless Signcryption Scheme from Weil Pairing. Search on Bibsonomy J. Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Wei Yuan, Liang Hu 0001, Hongtu Li, Jianfeng Chu, Yuyu Sun Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme. Search on Bibsonomy J. Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Hassan M. Elkamchouchi, Yasmine Abouelseoud, Wafaa S. Shouaib A new proxy signcryption scheme using warrants. Search on Bibsonomy Int. J. Intell. Eng. Informatics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Prashant Kushwah, Sunder Lal Efficient Identity Based Public Verifiable Signcryption Scheme Search on Bibsonomy CoRR The full citation details ... 2011 DBLP  BibTeX  RDF
15Huawang Qin, Yuewei Dai, Zhiquan Wang Identity-based multi-receiver threshold signcryption scheme. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Yang Lu 0001, Jiguo Li 0001 Certificate-Based Signcryption: Security Model and Efficient Construction. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
15Laila El Aimani Generic Constructions for Verifiable Signcryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
15Madeline González Muñiz, Peeter Laud Strong Forward Security in Identity-Based Signcryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
15S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan On the Security of ID Based Signcryption Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
15Prashant Kushwah, Sunder Lal Identity based signcryption schemes without random oracles. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
Displaying result #601 - #700 of 878 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license