Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Yiliang Han, Xiaolin Gui, Xu An Wang 0001 |
Multi-Recipient Signcryption for Secure Wireless Group Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 253, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Hassan M. Elkamchouchi, Yasmine Abouelseoud |
A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 41, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang |
An Efficient Identity-based Ring Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 254, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Sunder Lal, Prashant Kushwah |
ID based generalized signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 84, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, C. Pandu Rangan |
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 341, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Alexandre M. Deusajute, Paulo S. L. M. Barreto |
The SIP Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 72, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Chandrasekar S., Ambika K., C. Pandu Rangan |
Signcryption with Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 276, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan |
Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 225, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Fagen Li, Yong Yu 0002 |
An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 187, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Varad Kirtane, C. Pandu Rangan |
RSA-TBOS Signcryption with Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 324, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Analysis and Improvement of Authenticatable Ring Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 373, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Sunder Lal, Prashant Kushwah |
Multi-PKG ID based signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 50, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan |
On the Provable Security of Multi-Receiver Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 238, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, Naga Naresh Karuturi, Ragavendran Gopalakrishnan, C. Pandu Rangan |
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 247, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | S. Sharmila Deva Selvi, S. Sree Vivek, Neha Jain, C. Pandu Rangan |
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 342, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Manuel Barbosa, Pooya Farshim |
Certificateless Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 143, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Shivaramakrishnan Narayan, Parampalli Udaya, Peter Hyun-Jeen Lee |
Identity-based Signcryption without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 342-347, 2008, INSTICC Press, 978-989-8111-59-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
15 | Dai-Rui Lin, Chih-I Wang, D. J. Guan |
An Efficiently Online/Offline Signcryption for Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDA (3) ![In: Eighth International Conference on Intelligent Systems Design and Applications, ISDA 2008, 26-28 November 2008, Kaohsiung, Taiwan, 3 Volumes, pp. 472-478, 2008, IEEE Computer Society, 978-0-7695-3382-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Dongdong Sun, Yi Mu 0001, Willy Susilo |
A Generic Construction of Identity-Based Online/Offline Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2008, Sydney, NSW, Australia, December 10-12, 2008, pp. 707-712, 2008, IEEE Computer Society, 978-0-7695-3471-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Chik How Tan |
Forgery of Provable Secure Short Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9), pp. 1879-1880, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Yiliang Han |
Generalization of signcryption for resources-constrained environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Commun. Mob. Comput. ![In: Wirel. Commun. Mob. Comput. 7(7), pp. 919-931, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Sunder Lal, Tej Singh |
New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/cs/0701044, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
15 | Zhengjun Cao |
On the Authentication of One Popular Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 372, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
15 | Xu An Wang 0001, Xiaoyuan Yang 0002, Yiliang Han |
Provable Secure Generalized Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 173, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
15 | Shivaramakrishnan Narayan, Parampalli Udaya |
A Provably Secure Multi-Receiver Identity-based Signcryption using Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 305-308, 2007, INSTICC Press, 978-989-8111-12-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
15 | Yong Yu 0002, Bo Yang 0003, Ying Sun |
A provably secure ID-based mediated signcryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (3) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 647-652, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Maki Yoshida, Toru Fujiwara |
On the Security of Tag-KEM for Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCAN@ICALP ![In: Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2006, Venice, Italy, July 16, 2006, pp. 83-91, 2006, Elsevier. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Chik How Tan |
Analysis of improved signcryption scheme with key privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 99(4), pp. 135-138, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Fagen Li, Xiangjun Xin 0002, Yupu Hu |
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 3(2), pp. 155-159, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
15 | Chik How Tan |
Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1), pp. 206-208, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Fagen Li, Yupu Hu, Shuanggen Liu |
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 338, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
15 | Yiliang Han, Xiaoyuan Yang 0002 |
ECGSC: Elliptic Curve based Generalized Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 126, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
15 | Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng |
A secure extension of the Kwak-Moon group signcryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 25(6), pp. 435-444, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen |
Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCIS ![In: Proceedings of the 2006 Joint Conference on Information Sciences, JCIS 2006, Kaohsiung, Taiwan, ROC, October 8-11, 2006, 2006, Atlantis Press, 90-78677-01-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Attila Altay Yavuz, Fatih Alagöz, Emin Anarim |
NAMEPS: N -Tier Satellite Multicast Security Protocol Based on Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November - 1 December 2006, 2006, IEEE, 1-4244-0357-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Yevgeniy Dodis |
Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su |
An efficient signcryption scheme with forward secrecy based on elliptic curve. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 167(2), pp. 870-881, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Chik How Tan |
On the Security of Signcryption Scheme with Key Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(4), pp. 1093-1095, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Bok-Nyong Park, Wonjun Lee 0001 |
ISMANET: A Secure Routing Protocol Using Identity-Based Signcryption Scheme for Mobile Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Commun. ![In: IEICE Trans. Commun. 88-B(6), pp. 2548-2556, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Jun-Bao Liu, Guozhen Xiao |
Multi-Proxy Multi-Signcryption Scheme from Pairings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/cs/0509030, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
15 | Amit K. Awasthi, Sunder Lal |
An Efficient Scheme for Sensitive Message Transmission using Blind Signcryption ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/cs/0504095, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
15 | Tor E. Bjørstad, Alexander W. Dent |
Building Better Signcryption Schemes with Tag-KEMs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 405, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
15 | Tsz Hon Yuen, Victor K. Wei |
Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 412, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
15 | Jonathan Wong, Duncan S. Wong |
Known Session Key Attack Against a Collection of Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of The 2005 International Conference on Security and Management, SAM 2005, Las Vegas, Nevada, USA, June 20-23, 2005, pp. 119-126, 2005, CSREA Press, 1-932415-82-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
15 | Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Signcryption in Hierarchical Identity Based Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30 - June 1, 2005, Chiba, Japan, pp. 443-457, 2005, Springer, 0-387-25658-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
15 | |
Elliptic Curve based Signcryption and its Multi-party Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 142, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
15 | Liqun Chen 0002, John Malone-Lee |
Improved Identity-Based Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 114, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
15 | Tsz Hon Yuen, Victor K. Wei |
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 121, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
15 | Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Signcryption in Hierarchical Identity Based Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 244, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
15 | Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish |
Optimal Signcryption from Any Trapdoor Permutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 20, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
15 | Noel McCullagh, Paulo S. L. M. Barreto |
Efficient and Forward-Secure Identity-Based Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 117, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
15 | Shanshan Duan, Zhenfu Cao, Rongxing Lu |
Robust ID-based threshold signcryption scheme from pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecu ![In: Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004, pp. 33-37, 2004, ACM. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Yiliang Han, Xiaoyuan Yang 0002, Yupu Hu |
Signcryption based on elliptic curve and its multi-party schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecu ![In: Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004, pp. 216-217, 2004, ACM. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | John Charles Malone-Lee |
On the security of signature schemes and signcryption schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2004 |
RDF |
|
15 | Yitchak Gertner, Amir Herzberg |
Committing Encryption and Publicly-Verifiable SignCryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 254, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
15 | Xavier Boyen |
Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 163, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
15 | |
Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 43, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
15 | Divya Nalla, K. C. Reddy |
Signcryption scheme for Identity-based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 66, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
15 | Benoît Libert, Jean-Jacques Quisquater |
New identity based signcryption schemes from pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 23, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
15 | |
Signcryption scheme for Identity-based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 44, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
15 | Benoît Libert, Jean-Jacques Quisquater |
A new identity based signcryption scheme from pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITW ![In: Proceedings 2003 IEEE Information Theory Workshop, ITW 2003, La Sorbonne, Paris, France, 31 March - 4 April, 2003, pp. 155-158, 2003, IEEE, 0-7803-7799-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Xavier Boyen |
Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 383-399, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | John Malone-Lee |
Identity-Based Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2002, pp. 98, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
15 | Moonseog Seo, Kwangjo Kim |
Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC'99, Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings, pp. 269-277, 1999, Springer, 3-540-67380-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
15 | Yuliang Zheng 0001, Hideki Imai |
How to Construct Efficient Signcryption Schemes on Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 68(5), pp. 227-233, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
15 | Yuliang Zheng 0001 |
Signcryption and Its Applications in Efficient Public Key Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 291-312, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
14 | Wenbo Zhang, Hongqi Zhang, Bin Zhang 0015, Yan Yang |
An Identity-Based Authentication Model for Multi-domain in Grid Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 165-169, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Guangsong Li, Wenbao Han |
A New Scheme for Key Management in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part II, pp. 242-249, 2005, Springer, 3-540-25338-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Yan Wang 0002, Vijay Varadharajan |
A Mobile Autonomous Agent-based Secure Payment Protocol Supporting Multiple Payments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT ![In: Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Compiegne, France, September 19-22, 2005, pp. 88-94, 2005, IEEE Computer Society, 0-7695-2416-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Namje Park, Kiyoung Moon, Howon Kim 0001, Seungjoo Kim, Dongho Won |
XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies: 6th International Conference, EC-Web 2005, Copenhagen, Denmark, August 23-26, 2005, Proceedings, pp. 316-326, 2005, Springer, 3-540-28467-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Bok-Nyong Park, Jihoon Myung, Wonjun Lee 0001 |
LSRP: A Lightweight Secure Routing Protocol with Low Cost for Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Convergence in Broadband and Mobile Networking, International Conference, ICOIN 2005, Jeju Island, Korea, January 31- February 2, 2005, Proceedings, pp. 160-169, 2005, Springer, 3-540-24467-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Namje Park, Kiyoung Moon, Kyoil Chung, Seungjoo Kim, Dongho Won |
XML-Based Digital Signature Accelerator in Open Mobile Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings, pp. 323-333, 2005, Springer, 3-540-30510-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Fangguo Zhang, Yi Mu 0001, Willy Susilo |
Reducing Security Overhead for Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 398-403, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Yan Wang 0002, Tieyan Li |
LITESET/A++: A New Agent-Assisted Secure Payment Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 6-9 July 2004, San Diego, CA, USA, pp. 244-251, 2004, IEEE Computer Society, 0-7695-2098-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Xiaolin Pang 0001, Barbara Catania, Kian-Lee Tan |
Securing Your Data in Agent-Based P2P Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Eighth International Conference on Database Systems for Advanced Applications (DASFAA '03), March 26-28, 2003, Kyoto, Japan, pp. 55-62, 2003, IEEE Computer Society, 0-7695-1895-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Alwyn Goh, David Ngo Chek Ling |
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 27-39, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Dong Jin Kwak, JaeCheol Ha, Hoon-Jae Lee 0001, Hwankoo Kim, Sang-Jae Moon |
A WTLS Handshake Protocol with User Anonymity and Forward Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDMA International Conference ![In: Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29 - November 1, 2002, Revised Papers, pp. 219-230, 2002, Springer, 3-540-00732-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Goichiro Hanaoka, Yuliang Zheng 0001, Hideki Imai |
LITESET: A Light-Weight Secure Electronic Transaction Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 215-226, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|