-
2
-
-
0035898884
-
Cryptography on smart cards
-
Elsevier
-
Borst, J., Bart P., Rijmen.: Cryptography on smart cards. Elsevier, J. Computer Networks, vol. 36, pp. 423-435 (2001).
-
(2001)
J. Computer Networks
, vol.36
, pp. 423-435
-
-
Borst, J.1
Rijmen, B.P.2
-
3
-
-
4043064180
-
A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem
-
Elsevier
-
Chen, T.S.: A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem. Elsevier, J. Computer Standards & Interface, vol. 27, pp. 33-38 (2004).
-
(2004)
J. Computer Standards & Interface
, vol.27
, pp. 33-38
-
-
Chen, T.S.1
-
4
-
-
0142007147
-
Efficient proxy multisignature scheme based on the elliptic curve cryptosystem
-
Elsevier
-
Chen, T.S., Chung Y.F., Huang G.S.: Efficient proxy multisignature scheme based on the elliptic curve cryptosystem, Elsevier, Computer & Society, vol. 22, no. 6, pp. 527-534, (2003).
-
(2003)
Computer & Society
, vol.22
, Issue.6
, pp. 527-534
-
-
Chen, T.S.1
Chung, Y.F.2
Huang, G.S.3
-
5
-
-
2342473366
-
A practical authenticated encryption scheme based on the elliptic curve cryptosystems
-
Chen T.S., Huang K.H., Chung Y.F.: A practical authenticated encryption scheme based on the elliptic curve cryptosystems. J. Computer Standards & Interface vol. 26, pp. 461-469 (2004).
-
(2004)
J. Computer Standards & Interface
, vol.26
, pp. 461-469
-
-
Chen, T.S.1
Huang, K.H.2
Chung, Y.F.3
-
6
-
-
34948898634
-
Access control in user hierarchy based on elliptic curve cryptosystem
-
Elsevier
-
Chung, Y.F., Lee H.H., Lai, F., Chen, T. S.: Access control in user hierarchy based on elliptic curve cryptosystem. Elsevier, J. Information Sciences, vol. 178, pp. 230-243 (2008).
-
(2008)
J. Information Sciences
, vol.178
, pp. 230-243
-
-
Chung, Y.F.1
Lee, H.H.2
Lai, F.3
Chen, T.S.4
-
7
-
-
57349175668
-
New stream ciphers based on elliptic curve point multiplication
-
Elsevier
-
Deephti, P.P., Sathidevi P.S.: New stream ciphers based on elliptic curve point multiplication. Elsevier, J. Computer and Communication, vol. 32, pp. 25-33, (2009).
-
(2009)
J. Computer and Communication
, vol.32
, pp. 25-33
-
-
Deephti, P.P.1
Sathidevi, P.S.2
-
8
-
-
0344512405
-
Generalization of proxy signature based on elliptic curves
-
Elsevier
-
Hwang, M.S., Tzeng, S.F., Tsai C.S.: Generalization of proxy signature based on elliptic curves. Elsevier, J. Computer Standards & Interface, vol. 26, pp. 73-84 (2004).
-
(2004)
J. Computer Standards & Interface
, vol.26
, pp. 73-84
-
-
Hwang, M.S.1
Tzeng, S.F.2
Tsai, C.S.3
-
9
-
-
62549133356
-
Robust and Efficient Password -Authenticated Key Agreement Using Smart Cards
-
Juang, W.S., Chen, S.T., Liaw, H.T.: Robust and Efficient Password -Authenticated Key Agreement Using Smart Cards. IEEE Transactions on Industrial Electronics, vol.55, no.6. (2008).
-
(2008)
IEEE Transactions on Industrial Electronics
, vol.55
, Issue.6
-
-
Juang, W.S.1
Chen, S.T.2
Liaw, H.T.3
-
10
-
-
33745856988
-
An efficient key management scheme for hierarchical access control based on elliptic curve cryptosystems
-
Elsevier
-
Jeng, F.G., Wang C.M.: An efficient key management scheme for hierarchical access control based on elliptic curve cryptosystems. Elsevier, J. Systems and Software, vol. 79, pp. 1161-1167 (2006).
-
(2006)
J. Systems and Software
, vol.79
, pp. 1161-1167
-
-
Jeng, F.G.1
Wang, C.M.2
-
11
-
-
77954524976
-
An application of Modified Optimal -Type Elliptic Curve Blind Signature Scheme to Threshold Signature
-
IEE
-
Jianfen, P., Yajian, Z., Cong, W., Yixian, Y.: An application of Modified Optimal -Type Elliptic Curve Blind Signature Scheme to Threshold Signature. International Conference on Networking and Digital Society, IEE (2010).
-
(2010)
International Conference on Networking and Digital Society
-
-
Jianfen, P.1
Yajian, Z.2
Cong, W.3
Yixian, Y.4
-
13
-
-
74149091306
-
A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves
-
Elsevier
-
Liao, Y. P., Wang S. S.: A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Elsevier, J. Computer and Communications, vol. 33, pp. 372-380 (2010).
-
(2010)
J. Computer and Communications
, vol.33
, pp. 372-380
-
-
Liao, Y.P.1
Wang, S.S.2
-
14
-
-
77956061440
-
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
-
Elsevier
-
Nikooghadam, M., Zakerolhosseini, A., Moghaddam M. E.: Efficient utilization of elliptic curve cryptosystem for hierarchical access control. Elsevier, J. Systems and Software, vol. 83, pp. 1917-1929 (2010).
-
(2010)
J. Systems and Software
, vol.83
, pp. 1917-1929
-
-
Nikooghadam, M.1
Zakerolhosseini, A.2
Moghaddam, M.E.3
-
15
-
-
77957230388
-
Private key agreement and secure communication for heterogeneous sensor networks
-
Elsevier
-
Rahman, M. M., El-Khatib, K.: Private key agreement and secure communication for heterogeneous sensor networks. Elsevier, J. Parallel and Distributed Computing. vol. 70 , pp. 858-870(2010)
-
(2010)
J. Parallel and Distributed Computing
, vol.70
, pp. 858-870
-
-
Rahman, M.M.1
El-Khatib, K.2
-
18
-
-
0344081218
-
Digital Signatures with message recovery and its variants based on elliptic curve discrete logarithm problem
-
Elsevier
-
Tzeng, S.F., Hwang M.S.: Digital Signatures with message recovery and its variants based on elliptic curve discrete logarithm problem. Elsevier, J. Computer Standards & Interface, vol. 26, pp. 61-71 (2004).
-
(2004)
J. Computer Standards & Interface
, vol.26
, pp. 61-71
-
-
Tzeng, S.F.1
Hwang, M.S.2
-
19
-
-
80052311077
-
A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes
-
Elsevier In Press
-
Wang, C.H., Liu, Y.S.: A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes. Elsevier In Press, J. Network and Computer Applications (2010).
-
(2010)
J. Network and Computer Applications
-
-
Wang, C.H.1
Liu, Y.S.2
-
20
-
-
42549111729
-
The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks
-
IEEE
-
Wang, Y., Ramamurthy, B., Zou, X.: The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks. IEEE, International Conference on Communication (2006).
-
International Conference on Communication (2006)
-
-
Wang, Y.1
Ramamurthy, B.2
Zou, X.3
-
21
-
-
80052317907
-
A new provably secure authentication and key agreement protocol for SIP using ECC
-
Elsevier In Press
-
Wu, L., Zhang Y., Wang F.: A new provably secure authentication and key agreement protocol for SIP using ECC. Elsevier In Press, J. Computer Standard & Interface.(2008)
-
(2008)
J. Computer Standard & Interface
-
-
Wu, L.1
Zhang, Y.2
Wang, F.3
-
22
-
-
63049116480
-
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystems
-
Elsevier
-
Yang, J. H., Chang C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystems. Elsevier , J. Computer & Security , vol. 28, pp. 138-143 (2009)
-
(2009)
J. Computer & Security
, vol.28
, pp. 138-143
-
-
Yang, J.H.1
Chang, C.C.2
-
23
-
-
68949161753
-
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
-
Yang, J. H., Chang C.C.: An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. J. Systems and Software. vol. 82, pp. 1497-1502 (2009)
-
(2009)
J. Systems and Software
, vol.82
, pp. 1497-1502
-
-
Yang, J.H.1
Chang, C.C.2
-
24
-
-
84943602652
-
Message Recovery Signature Scheme Using Complementary Elliptic Curves
-
IEEE
-
Yew, T. C., Haili, H.K., Sumari, P.: Message Recovery Signature Scheme Using Complementary Elliptic Curves. International Conference on Geometric Modeling and Graphics, IEEE, (2003).
-
(2003)
International Conference on Geometric Modeling and Graphics
-
-
Yew, T.C.1
Haili, H.K.2
Sumari, P.3
-
25
-
-
0040712314
-
How to construct efficient signcryption scheme on elliptic curves
-
Elsevier
-
Zheng, Y., Imai H.: How to construct efficient signcryption scheme on elliptic curves. Elsevier, J. Information Processing Letters vol. 68 pp. 227-233 (1998).
-
(1998)
J. Information Processing Letters
, vol.68
, pp. 227-233
-
-
Zheng, Y.1
Imai, H.2
|