-
3
-
-
84865366436
-
An efficient and provably-secure certificateless signature scheme without bilinear pairings
-
He D., Chen J., Zhang R. An efficient and provably-secure certificateless signature scheme without bilinear pairings. International Journal of Communication Systems 2012, 25(11):1432-1442.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.11
, pp. 1432-1442
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
5
-
-
84904406563
-
Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings
-
Tsai J., Lo N., Wu T. Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings. International Journal of Communication Systems 2012, 10.1002/dac.2388.
-
(2012)
International Journal of Communication Systems
-
-
Tsai, J.1
Lo, N.2
Wu, T.3
-
6
-
-
80052626402
-
A new two-round certificateless authenticated key agreement protocol without bilinear pairings
-
He D., Chen Y., Chen J., Zhang R. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Mathematical and Computer Modelling 2011, 54(11-12):3143-3152.
-
(2011)
Mathematical and Computer Modelling
, vol.54
, Issue.11-12
, pp. 3143-3152
-
-
He, D.1
Chen, Y.2
Chen, J.3
Zhang, R.4
-
7
-
-
80052632132
-
A pairing-free certificateless authenticated key agreement protocol
-
He D., Chen J., Hu J. A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems 2012, 25(2):221-230.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.2
, pp. 221-230
-
-
He, D.1
Chen, J.2
Hu, J.3
-
8
-
-
84865646945
-
An efficient certificateless authenticated key agreement protocol
-
He D., Padhye S., Chen J. An efficient certificateless authenticated key agreement protocol. Computers & Mathematics with Applications 2012, 64(6):1914-1926.
-
(2012)
Computers & Mathematics with Applications
, vol.64
, Issue.6
, pp. 1914-1926
-
-
He, D.1
Padhye, S.2
Chen, J.3
-
10
-
-
80052048414
-
Certificateless signcryption scheme without bilinear pairing
-
Liu W., Xu C. Certificateless signcryption scheme without bilinear pairing. Journal of Software 2011, 22(8):1918-1926.
-
(2011)
Journal of Software
, vol.22
, Issue.8
, pp. 1918-1926
-
-
Liu, W.1
Xu, C.2
-
11
-
-
0030231965
-
Proxy signatures: delegation of the power to sign messages
-
Mambo M., Usuda K., Okamoto E. Proxy signatures: delegation of the power to sign messages. IEICE-Transactions on Fundamentals 1996, E79-A(9):1338-1354.
-
(1996)
IEICE-Transactions on Fundamentals
, vol.E79 A
, Issue.9
, pp. 1338-1354
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
12
-
-
85066114874
-
Disallowing unauthorized state changes of distributed shared objects
-
SEC'00
-
J. Leiwo, C. Hanle, P. Homburg, A.S. Tanenbaum, Disallowing unauthorized state changes of distributed shared objects, in: Information Security for Global Information Infrastructures, SEC'00, 2000, pp. 381-390.
-
(2000)
Information Security for Global Information Infrastructures
, pp. 381-390
-
-
Leiwo, J.1
Hanle, C.2
Homburg, P.3
Tanenbaum, A.S.4
-
13
-
-
0032218229
-
A security architecture for computational grids
-
I. Foster, C. Kesselman, G. Tsudik, S. Tuecke, A security architecture for computational grids, in: Fifth ACM Conference on Computers and Communications Security, 1998, pp. 83-92.
-
(1998)
Fifth ACM Conference on Computers and Communications Security
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
14
-
-
84956995852
-
A digital nominative proxy signature scheme for mobile communication
-
ICICS 2001
-
H. Park, I. Lee, A digital nominative proxy signature scheme for mobile communication, in: Information and Communications Security, ICICS 2001, 2001, pp. 451-455.
-
(2001)
Information and Communications Security
, pp. 451-455
-
-
Park, H.1
Lee, I.2
-
15
-
-
1642614187
-
Strong proxy signature and its applications
-
SCIS'01
-
B. Lee, H. Kim, K. Kim, Strong proxy signature and its applications, in: Proceeding of the 2001 Symposium on Cryptography and Information Security, SCIS'01, 2001, pp. 603-608.
-
(2001)
Proceeding of the 2001 Symposium on Cryptography and Information Security
, pp. 603-608
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
16
-
-
84964397315
-
A law-abiding peer-to-peer network for free-software distribution
-
NCA 2001
-
A. Bakker, M. Steen, A.S. Anenbaum, A law-abiding peer-to-peer network for free-software distribution, in: IEEE International Symposium on Network Computing and Applications, NCA 2001, 2001, pp. 60-67.
-
(2001)
IEEE International Symposium on Network Computing and Applications
, pp. 60-67
-
-
Bakker, A.1
Steen, M.2
Anenbaum, A.S.3
-
17
-
-
18244396341
-
Certificateless signature and proxy signature schemes from bilinear pairings
-
Li X., Chen K., Sun L. Certificateless signature and proxy signature schemes from bilinear pairings. Lithuanian Mathematical Journal 2005, 45:76-83.
-
(2005)
Lithuanian Mathematical Journal
, vol.45
, pp. 76-83
-
-
Li, X.1
Chen, K.2
Sun, L.3
-
18
-
-
37249039189
-
Cryptanalysis of some proxy signature schemes without certificates
-
W. Yap, S. Heng, B. Goi, Cryptanalysis of some proxy signature schemes without certificates, in: Proc. WISTP 2007, 2007, pp. 115-126.
-
(2007)
Proc. WISTP 2007
, pp. 115-126
-
-
Yap, W.1
Heng, S.2
Goi, B.3
-
19
-
-
35148863557
-
Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings
-
R. Lu, D. He, C. Wang, Cryptanalysis and improvement of a certificateless proxy signature scheme from bilinear pairings, in: Proc. SNPD 2007, 2007, pp. 285-290.
-
(2007)
Proc. SNPD 2007
, pp. 285-290
-
-
Lu, R.1
He, D.2
Wang, C.3
-
20
-
-
63749105837
-
Certificateless proxy signature scheme with provable security
-
Chen H., Zhang F., Song R. Certificateless proxy signature scheme with provable security. Journal of Software 2009, 20(3):692-701.
-
(2009)
Journal of Software
, vol.20
, Issue.3
, pp. 692-701
-
-
Chen, H.1
Zhang, F.2
Song, R.3
-
21
-
-
77954763712
-
A provably secure proxy signature scheme in certificateless cryptography
-
Xiong H., Li F., Qin Z. A provably secure proxy signature scheme in certificateless cryptography. Informatica 2010, 21(2):277-294.
-
(2010)
Informatica
, vol.21
, Issue.2
, pp. 277-294
-
-
Xiong, H.1
Li, F.2
Qin, Z.3
-
22
-
-
80055032857
-
Delegation of signing rights using certificateless proxy signatures
-
Zhang L., Zhang F., Wu Q. Delegation of signing rights using certificateless proxy signatures. Information Sciences 2012, 184:298-309.
-
(2012)
Information Sciences
, vol.184
, pp. 298-309
-
-
Zhang, L.1
Zhang, F.2
Wu, Q.3
-
23
-
-
84875677758
-
Delegation of signing rights using certificateless proxy signatures
-
Seo S., Choi K., Hwang J., Kim S. Delegation of signing rights using certificateless proxy signatures. Information Sciences 2012, 188:321-337.
-
(2012)
Information Sciences
, vol.188
, pp. 321-337
-
-
Seo, S.1
Choi, K.2
Hwang, J.3
Kim, S.4
-
25
-
-
78049296439
-
A pairing-free identity-based authenticated key agreement scheme with minimal message exchanges
-
Cao X., Kou W. A pairing-free identity-based authenticated key agreement scheme with minimal message exchanges. Information Sciences 2010, 180:2895-2903.
-
(2010)
Information Sciences
, vol.180
, pp. 2895-2903
-
-
Cao, X.1
Kou, W.2
-
26
-
-
84855353789
-
An ID-based proxy signature schemes without bilinear pairings
-
He D., Chen J., Hu J. An ID-based proxy signature schemes without bilinear pairings. Annals of Telecommunications 2011, 66(11-12):657-662.
-
(2011)
Annals of Telecommunications
, vol.66
, Issue.11-12
, pp. 657-662
-
-
He, D.1
Chen, J.2
Hu, J.3
-
27
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
-
He D., Chen J., Hu J. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Information Fusion 2012, 13(3):213-230.
-
(2012)
Information Fusion
, vol.13
, Issue.3
, pp. 213-230
-
-
He, D.1
Chen, J.2
Hu, J.3
-
28
-
-
38149080541
-
-
ACISP 2007
-
X. Huang, Y. Mu, W. Susilo, D. Wong, W. Wu, Certificateless signature revisited, in: ACISP 2007, 2007, pp. 308-321.
-
(2007)
Certificateless signature revisited
, pp. 308-321
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Wong, D.4
Wu, W.5
-
29
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
David P., Jacque S. Security arguments for digital signatures and blind signatures. Journal of Cryptology 2000, 13(3):361-396.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
David, P.1
Jacque, S.2
|