Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Ziba Eslami, Nasrollah Pakniat |
Certificateless Aggregate Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 360, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
15 | Caixue Zhou |
A Multi-Receiver ID-Based Generalized Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 601, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
15 | Shin-Jia Hwang, Yun-Hao Sung |
Confidential deniable authentication using promised signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 84(10), pp. 1652-1659, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Qiong Huang 0001, Duncan S. Wong, Guomin Yang |
Heterogeneous Signcryption with Key Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 54(4), pp. 525-536, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Xiaofei Jing |
Provably secure certificateless signcryption scheme without pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMEIT ![In: International Conference on Electronic and Mechanical Engineering and Information Technology, EMEIT 2011, Harbin, Heilongjiang, China, 12-14 August, 2011, pp. 4753-4756, 2011, IEEE, 978-1-61284-087-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Identity Based Online/Offline Encryption and Signcryption Schemes Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecHiComNet ![In: Security Aspects in Information Technology - First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings, pp. 111-127, 2011, Springer, 978-3-642-24585-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Indivar Gupta, P. K. Saxena |
Distributed Signcryption Schemes with Formal Proof of Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecHiComNet ![In: Security Aspects in Information Technology - First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings, pp. 93-110, 2011, Springer, 978-3-642-24585-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Daiki Chiba 0002, Takahiro Matsuda 0002, Jacob C. N. Schuldt, Kanta Matsuura |
Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings, pp. 220-237, 2011, 978-3-642-21553-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Indivar Gupta, P. K. Saxena |
Distributed Signcryption from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 215-234, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Subhalaxmi Das, Sujata Mohanty, Banshidhar Majhi |
A Convertible Designated Verifible Blind Multi-signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACC (4) ![In: Advances in Computing and Communications - First International Conference, ACC 2011, Kochi, India, July 22-24, 2011, Proceedings, Part IV, pp. 549-556, 2011, Springer, 978-3-642-22725-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Yang Ming 0001, Xiangmo Zhao, Yumin Wang |
Multi-receiver Identity-Based Signcryption Scheme in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICA (LNCS) ![In: Information Computing and Applications - Second International Conference, ICICA 2011, Qinhuangdao, China, October 28-31, 2011. Proceedings, pp. 487-494, 2011, Springer, 978-3-642-25254-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman |
Toward Dynamic Attribute-Based Signcryption (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 439-443, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Jia Fan, Yuliang Zheng 0001, Xiaohu Tang |
A Single Key Pair is Adequate for the Zheng Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 371-388, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Woomyo Lee, Jae Woo Seo, Pil Joong Lee |
Identity-Based Signcryption from Identity-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers, pp. 70-83, 2011, Springer, 978-3-642-27889-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Laila El Aimani |
Generic Constructions for Verifiable Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers, pp. 204-218, 2011, Springer, 978-3-642-31911-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi |
Efficient Identity-Based Signcryption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 120-137, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Bo Zhang 0020 |
An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGIT-SecTech ![In: Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, pp. 123-127, 2011, Springer, 978-3-642-27188-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Changji Wang, Jiasen Huang |
Attribute-based Signcryption with Ciphertext-policy and Claim-predicate Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Seventh International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, December 3-4, 2011, pp. 905-909, 2011, IEEE Computer Society, 978-1-4577-2008-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Ming Luo, Chun-hua Zou, Jianfeng Xu |
Certificateless Broadcast Signcryption with Forward Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Seventh International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, December 3-4, 2011, pp. 910-914, 2011, IEEE Computer Society, 978-1-4577-2008-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Caifen Wang, Xiaojun Cao |
An Improved Signcryption with Proxy Re-encryption and its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Seventh International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, December 3-4, 2011, pp. 886-890, 2011, IEEE Computer Society, 978-1-4577-2008-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Mohsen Toorani, Ali Asghar Beheshti Shirazi |
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 10(1), pp. 51-56, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Baodian Wei, Fangguo Zhang, Xiaofeng Chen 0001 |
Efficient Online/Offline Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intell. Autom. Soft Comput. ![In: Intell. Autom. Soft Comput. 16(3), pp. 449-459, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Chung Ki Li, Duncan S. Wong |
Signcryption from randomness recoverable public key encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 180(4), pp. 549-559, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Zhenhua Liu 0001, Yupu Hu, Xiangsong Zhang, Hua Ma |
Certificateless signcryption scheme in the standard model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 180(3), pp. 452-464, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Yiling Wen, Jianfeng Ma 0001, Sang-Jae Moon |
Efficient and Identity-based Signcryption with Provably-secure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Content Technol. its Appl. ![In: J. Digit. Content Technol. its Appl. 4(7), pp. 148-153, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Junbeom Hur, Chanil Park, Hyunsoo Yoon |
Chosen ciphertext secure authenticated group communication using identity-based signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Math. Appl. ![In: Comput. Math. Appl. 60(2), pp. 362-375, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang, Yi-Shiung Yeh |
Efficient proxy signcryption scheme with provable CCA and CMA security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Math. Appl. ![In: Comput. Math. Appl. 60(7), pp. 1850-1858, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Gang Yu, Xiaoxiao Ma, Yong Shen, Wenbao Han |
Provable secure identity based generalized signcryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 411(40-42), pp. 3614-3624, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Zhengping Jin, Qiaoyan Wen, Hongzhen Du |
An improved semantically-secure identity-based signcryption scheme in the standard model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 36(3), pp. 545-552, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Yinxia Sun, Hui Li |
Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 53(3), pp. 557-566, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Mohsen Toorani, Ali Asghar Beheshti Shirazi |
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1004.3521, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Mohsen Toorani, Ali Asghar Beheshti Shirazi |
An Elliptic Curve-based Signcryption Scheme with Forward Secrecy ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1005.1856, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Mohsen Toorani, Ali Asghar Beheshti Shirazi |
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1002.3303, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Mohsen Toorani, Asghar Beheshti 0001 |
A Directly Public Verifiable Signcryption Scheme based on Elliptic Curves ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1002.3316, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Gang Yu, Xiaoxiao Ma, Yong Shen, Wenbao Han |
Provable Secure Identity Based Generalized Signcryption Scheme ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1004.1304, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Jia Fan, Yuliang Zheng 0001, Xiaohu Tang |
Signcryption with Non-interactive Non-repudiation without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science X - Special Issue on Security in Computing, Part I, pp. 202-230, 2010, Springer, 978-3-642-17498-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Prashant Kushwah, Sunder Lal |
Efficient Generalized Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 346, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Huifang Ji, Wenbao Han, Long Zhao |
Certificateless generalized signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 204, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Identity Based Online/Offline Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 376, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Security Weaknesses in Two Certificateless Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 92, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Joseph K. Liu, Joonsang Baek, Jianying Zhou 0001 |
Online/Offline Identity-Based Signcryption Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 274, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Identity Based Public Verifiable Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 343, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Zhengping Jin, Qiaoyan Wen, Hua Zhang 0001 |
A supplement to Liu et al.'s certificateless signcryption scheme in the standard model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 252, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Wenjian Xie, Zhang Zhang |
Certificateless Signcryption without Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 187, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Hao Wang 0007, Qiuliang Xu, Xiufeng Zhao |
Generalized Hierarchical Identity-Based Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. ![In: J. Comput. 5(7), pp. 1078-1085, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Xu An Wang 0001, Xiaoyuan Yang 0002, Jindan Zhang |
Provable Secure Generalized Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. ![In: J. Comput. 5(5), pp. 807-814, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Alexander W. Dent, Yuliang Zheng 0001 (eds.) |
Practical Signcryption ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2010 |
DBLP DOI BibTeX RDF |
|
15 | Wenjian Xie, Zhang Zhang |
Efficient and provably secure certificateless signcryption from bilinear maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNIS ![In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, 25-27 June 2010, Beijing, China, pp. 558-562, 2010, IEEE, 978-1-4244-5850-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Joseph K. Liu, Joonsang Baek, Jianying Zhou 0001 |
Online/Offline Identity-Based Signcryption Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers, pp. 36-51, 2010, Springer, 978-3-642-21517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, Sakhi S. Anand, C. Pandu Rangan |
An Identity based Ring Signcryption Scheme with Public Verifiability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 362-371, 2010, SciTePress, 978-989-8425-18-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Jianhong Zhang, Xiuna Su |
An Efficient Signcryption Schemes Based from Bilinear Maps in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: 5th IEEE Asia-Pacific Services Computing Conference, APSCC 2010, 6-10 December 2010, Hangzhou, China, Proceedings, pp. 447-453, 2010, IEEE Computer Society, 978-0-7695-4305-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Yeojeong Yoon, Chanil Park, Pyung Kim, Seongoun Hwang, Hyunsoo Yoon |
An efficient identity-based proxy signcryption for secure broadcast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 5th International Conference for Internet Technology and Secured Transactions, ICITST 2010, London, United Kingdom, November 8-10, 2010, pp. 1-6, 2010, IEEE, 978-1-4244-8862-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Atanu Basu, Indranil Sengupta 0001 |
Verifiable (t, n) Threshold Secret Sharing Scheme Using ECC Based Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISTM ![In: Information Systems, Technology and Management - 4th International Conference, ICISTM 2010, Bangkok, Thailand, March 11-13, 2010. Proceedings, pp. 133-144, 2010, Springer, 978-3-642-12034-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Bo Zhang 0020, Qiuliang Xu |
An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AST/UCMA/ISA/ACN ![In: Advances in Computer Science and Information Technology, AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings, pp. 15-27, 2010, Springer, 978-3-642-13576-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schröder |
Confidential Signatures and Deterministic Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings, pp. 462-479, 2010, Springer, 978-3-642-13012-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Sumit Kumar Pandey, Rana Barua |
Construction of Identity Based Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers, pp. 1-14, 2010, Springer, 978-3-642-17954-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Certificateless KEM and Hybrid Signcryption Schemes Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 294-307, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Martin Gagné, Shivaramakrishnan Narayan, Reihaneh Safavi-Naini |
Threshold Attribute-Based Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings, pp. 154-171, 2010, Springer, 978-3-642-15316-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Identity Based Public Verifiable Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings, pp. 244-260, 2010, Springer, 978-3-642-16279-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Mingwu Zhang, Bo Yang 0003, Tsuyoshi Takagi, Yanping Shen, Wenzheng Zhang |
Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings, pp. 77-87, 2010, Springer, 978-3-642-13600-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Mingwu Zhang, Pengcheng Li, Bo Yang 0003, Hao Wang, Tsuyoshi Takagi |
Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAISI ![In: Intelligence and Security Informatics, Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings, pp. 98-104, 2010, Springer, 978-3-642-13600-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Chuanrong Zhang, Lianqing Zheng, Mingwen Xia, Yuqing Zhang |
Secure Signcryption Scheme Based on a Hybrid Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 2010 International Conference on Computational Intelligence and Security, CIS 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December 11-14, 2010, pp. 537-540, 2010, IEEE Computer Society, 978-1-4244-9114-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Hao Wang 0007, Qiuliang Xu, Han Jiang 0001, Xiufeng Zhao |
A Fully Anonymous Identity-Based Signcryption Scheme in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 2010 International Conference on Computational Intelligence and Security, CIS 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December 11-14, 2010, pp. 372-376, 2010, IEEE Computer Society, 978-1-4244-9114-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Jianhong Zhang, Jian Mao |
A novel identity-based multi-signcryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 32(1), pp. 14-18, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Yong Yu 0002, Bo Yang 0003, Ying Sun, Shenglin Zhu |
Identity based signcryption scheme without random oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 31(1), pp. 56-62, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen |
Ring signature scheme for ECC-based anonymous signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 31(4), pp. 669-674, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang |
An efficient and provable secure identity-based ring signcryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 31(6), pp. 1092-1097, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Munendra Agrawal, Prashant Kushwah, Sunder Lal |
An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0909.1412, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Jianhong Zhang, Yixian Yang, Xinxin Niu |
A Novel Identity-Based Multi-Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Distributed Sens. Networks ![In: Int. J. Distributed Sens. Networks 5(1), pp. 28, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 298, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam, Dominique Schröder |
Confidential Signatures and Deterministic Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 588, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Mingwu Zhang, Yusheng Zhong, Pengcheng Li, Bo Yang 0003 |
Analysis and Enhance of Anonymous Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 194, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Identity-Based Hybrid Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 455, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Certificateless Hybrid Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 162, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Sunder Lal, Prashant Kushwah |
Generalization of Barreto et al ID based Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 193, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto |
On the Connection between Signcryption and One-pass Key Establishment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 436, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Certificateless KEM and Hybrid Signcryption Schemes Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 462, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Wenjian Xie, Zhang Zhang |
Efficient and Provably Secure Certificateless Signcryption from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 578, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 235, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Sunder Lal, Prashant Kushwah |
Anonymous ID Based Signcryption Scheme for Multiple Receivers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 345, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan |
ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 52, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
A note on the Certificateless Multi-receiver Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 308, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
On the security of Identity Based Ring Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 144, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Yuliang Zheng 0001 |
Coded Modulation and the Arrival of Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes ![In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, pp. 17-27, 2009, IOS Press, 978-1-60750-002-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Jianhong Zhang, Qin Geng |
Cryptoanalysis of Two Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 65-68, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, Shilpi Nayak, C. Pandu Rangan |
Breaking and Building of Threshold Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers, pp. 108-123, 2009, Springer, 978-3-642-16341-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers, pp. 75-92, 2009, Springer, 978-3-642-16341-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Kohei Tatara, Kouichi Sakurai |
A Signature Scheme Associated with Universal Re-signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 780-785, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan |
On the Security of Two Ring Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 219-224, 2009, INSTICC Press, 978-989-674-005-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Hassan M. Elkamchouchi, Mohamed E. Nasr, Roayat Ismail Elseedy |
A New Efficient Strong Proxy Signcryption Scheme Based on a Combination of Hard Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, San Antonio, TX, USA, 11-14 October 2009, pp. 5123-5127, 2009, IEEE, 978-1-4244-2794-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Certificateless Hybrid Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 112-123, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Jianhong Zhang, Hua Chen |
Efficient Provable Secure ID-Based Anonymous Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACCS ![In: 2009 Pacific-Asia Conference on Circuits, Communications and Systems, PACCS 2009, Chengdu, China, 16-17 May 2009, pp. 415-418, 2009, IEEE Computer Society, 978-0-7695-3614-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Hassan M. Elkamchouchi, Mohamed E. Nasr, Roayat Ismail |
A New Efficient Multiple Broadcasters Signcryption Scheme (MBSS) for Secure Distributed Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: The Fifth International Conference on Networking and Services, ICNS 2009, 20-25 April 2009, Valencia, Spain, pp. 204-209, 2009, IEEE Computer Society, 978-0-7695-3586-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Qi Xia, Chunxiang Xu |
Cryptanalysis of Two Identity Based Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC ![In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2009, Chengdu, China, 12-14 December, 2009, pp. 292-294, 2009, IEEE Computer Society, 978-0-7695-3929-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Zhengjun Cao, Olivier Markowitch |
Different Authentication Properties and a Signcryption Scheme Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (1) ![In: 2009 International Conference on Computational Intelligence and Security, CIS 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference Papers, pp. 395-399, 2009, IEEE Computer Society, 978-0-7695-3931-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Chuanrong Zhang, Yuqing Zhang |
New ID-Based and Threshold Key Distribution Protocol in MANET Using a Multi-signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: 2009 International Conference on Computational Intelligence and Security, CIS 2009, Beijing, China, 11-14 December 2009, Volume 2 - Workshop Papers, pp. 392-396, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Chik How Tan |
On the Security of Provably Secure Multi-Receiver ID-Based Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7), pp. 1836-1838, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Fagen Li, Xiangjun Xin 0002, Yupu Hu |
Indentity-based broadcast signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 30(1-2), pp. 89-94, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Fagen Li, Xiangjun Xin 0002, Yupu Hu |
ID-based threshold proxy signcryption scheme from bilinear pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 3(3), pp. 206-215, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Zhengping Jin, Huijuan Zuo, Hongzhen Du, Qiaoyan Wen |
An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 195, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|