-
1
-
-
63449122349
-
-
in: Proceedings of Cryptology-CRYPTO'97, California, USA
-
Y. Zheng, "Digital signcryption or how to achieve cost (signature & encryption) (cost (signature) + cost (encryption))", in: Proceedings of Cryptology-CRYPTO'97, California, USA, pp. 165-179, 1997.
-
(1997)
Digital Signcryption Or How to Achieve Cost (signature & Encryption) (cost (signature) + Cost (encryption))
, pp. 165-179
-
-
Zheng, Y.1
-
2
-
-
85020598353
-
Identity-based Cryptosystems and Signature Schemes
-
in: California, USA
-
A. Shamir, Identity-based cryptosystems and signature schemes, in: Proceedings of the Cryptology - CRYPTO'84, California, USA, pp. 47-53, 1984.
-
(1984)
Proceedings of the Cryptology - CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
3
-
-
84874324906
-
Identity Based Encryption From the Weil Pairing
-
in: California, USA
-
D. Boneh, M. Franklin, "Identity based encryption from the Weil pairing", in: Proceedings of the Crypto 2001, California, USA, pp. 213-229, 2001.
-
(2001)
Proceedings of the Crypto 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
77956095210
-
Provable secure identity based generalized signcryption scheme
-
G. Yu, X.X. Ma, Y. Shen, et al, "Provable secure identity based generalized signcryption scheme", Theoretical Computer Science, vol. 411, no. 40, pp. 3614-3624, 2010.
-
(2010)
Theoretical Computer Science
, vol.411
, Issue.40
, pp. 3614-3624
-
-
Yu, G.1
Ma, X.X.2
Shen, Y.3
-
5
-
-
77954596761
-
-
in: Proceedings of Computer Science and Information Technology, Chengdu, China
-
B. Zhang, Q. L. Xu, "An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model," in: Proceedings of Computer Science and Information Technology, Chengdu, China, pp. 15-27, 2010.
-
(2010)
An ID-Based Anonymous Signcryption Scheme For Multiple Receivers Secure In the Standard Model
, pp. 15-27
-
-
Zhang, B.1
Xu, Q.L.2
-
6
-
-
77950628145
-
An improved semantically-secure identity-based signcryption scheme in the standard model
-
Z. P. Jin, Q. Y. Wen, and H. Z. Du, "An improved semantically-secure identity-based signcryption scheme in the standard model," Computers & Electrical Engineering, Vol. 36, pp. 545-552, 2010.
-
(2010)
Computers & Electrical Engineering
, vol.36
, pp. 545-552
-
-
Jin, Z.P.1
Wen, Q.Y.2
Du, H.Z.3
-
7
-
-
4544385042
-
An Authenticated Broadcasting Scheme For Wireless Ad Hoc Network
-
in: Fredericton, N.B., Canada
-
M. J. Bohio, A. Miri, "An authenticated broadcasting scheme for wireless ad hoc network", in: Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR), Fredericton, N.B., Canada, pp. 69-74, 2004.
-
(2004)
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR)
, pp. 69-74
-
-
Bohio, M.J.1
Miri, A.2
-
8
-
-
35048884128
-
Identity-based Authenticated Broadcast Encryption and Distributed Authenticated Encryption
-
In: Chiang Mai, Thailand
-
Y. Mu, W. Susilo, Y. X. Lin, C. Ruan, "Identity-based authenticated broadcast encryption and distributed authenticated encryption", In: Proceedings of the 9th Asian Computing Science Conference, Chiang Mai, Thailand, pp. 169-181, 2004.
-
(2004)
Proceedings of the 9th Asian Computing Science Conference
, pp. 169-181
-
-
Mu, Y.1
Susilo, W.2
Lin, Y.X.3
Ruan, C.4
-
9
-
-
35448936926
-
Identity-based broadcast signcryption
-
F. G. Li, X. J. Xin, Y. P. Hu, "Identity-based broadcast signcryption", Computer Standards and Interfaces, vol. 30, no.1, pp. 89-94, 2008.
-
(2008)
Computer Standards and Interfaces
, vol.30
, Issue.1
, pp. 89-94
-
-
Li, F.G.1
Xin, X.J.2
Hu, Y.P.3
-
10
-
-
70350077561
-
Comment On An ID-based Broadcast Signcryption Scheme
-
in: Guiyang, China
-
J. H. Zhang, Q. Geng, "Comment on an ID-based Broadcast Signcryption Scheme", in: Proceedings of the International Conference on Networking and Digital Society, Guiyang, China, pp.37-40, 2009.
-
(2009)
Proceedings of the International Conference on Networking and Digital Society
, pp. 37-40
-
-
Zhang, J.H.1
Geng, Q.2
-
11
-
-
67650046720
-
Cryptanalysis of Bohio Et Al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme For Wireless Ad-hoc Networks
-
In: Fredericton, N.B., Canada
-
S. S. D. Selvi, S. S. Vivek, N. N. Karuturi, "Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks", In: Proceedings of the PST 2008, Fredericton, N.B., Canada, pp. 109-120, 2008.
-
(2008)
Proceedings of the PST 2008
, pp. 109-120
-
-
Selvi, S.S.D.1
Vivek, S.S.2
Karuturi, N.N.3
-
12
-
-
84856535562
-
-
in: Cryptology ePrint Archive, Report 2008/225
-
S. S. D. Selvi, S. S. Vivek, R. Gopalakrishnan, et al, "Provably Secure ID-based Broadcast Signcryption (IBBSC) Scheme", in: Cryptology ePrint Archive, Report 2008/225, pp. 1-24, 2008.
-
(2008)
Provably Secure ID-based Broadcast Signcryption (IBBSC) Scheme
, pp. 1-24
-
-
Selvi, S.S.D.1
Vivek, S.S.2
Gopalakrishnan, R.3
-
13
-
-
70350680966
-
Cryptanalysis of Mu Et Al.'s and Li Et Al.'s Schemes and A Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
-
in: Jeju Island, Korea
-
S. S. D. Selvi, S. S. Vivek, R. Gopalakrishnan, et al, "Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme", in: Proceedings of the WISA 2008, Jeju Island, Korea, pp. 115-129, 2009.
-
(2009)
Proceedings of the WISA 2008
, pp. 115-129
-
-
Selvi, S.S.D.1
Vivek, S.S.2
Gopalakrishnan, R.3
-
14
-
-
79951920875
-
An Efficient Identity-based Broadcast Signcryption Scheme
-
in: Hanoi, Vietnam
-
D. T. Hien, T. N. Tien, T. T. T. Hien, "An Efficient Identity-based Broadcast Signcryption Scheme," in: Proceedings of the KSE 2010, Hanoi, Vietnam, pp. 209-216, 2010.
-
(2010)
Proceedings of the KSE 2010
, pp. 209-216
-
-
Hien, D.T.1
Tien, T.N.2
Hien, T.T.T.3
-
15
-
-
79956145687
-
An Efficient Identity-Based Broadcast Signcryption Scheme For Wireless Sensor Networks
-
in: Hong Kong, China
-
I. T. Kim, S. O. Hwang, "An Efficient Identity-Based Broadcast Signcryption Scheme for Wireless Sensor Networks," in: Proceedings of the ISWPC 2011, Hong Kong, China, pp. 1-6, 2011.
-
(2011)
Proceedings of the ISWPC 2011
, pp. 1-6
-
-
Kim, I.T.1
Hwang, S.O.2
|