-
1
-
-
77956877124
-
The internet of things: A survey
-
Oct.
-
L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey, " Comput. Netw., vol. 54, no. 15, pp. 2787-2805, Oct. 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
2
-
-
67649560482
-
Integrating wireless sensor networks and the internet: A security analysis
-
R. Roman and J. Lopez, "Integrating wireless sensor networks and the Internet: A security analysis, " Internet Res., vol. 19, no. 2, pp. 246-259, 2009.
-
(2009)
Internet Res.
, vol.19
, Issue.2
, pp. 246-259
-
-
Roman, R.1
Lopez, J.2
-
3
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2139. New York, NY, USA: Springer-Verlag, 2001, pp. 213-229. (Pubitemid 33317917)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
63449122349
-
Digital Signcryption or How to Achieve Cost (Signature & Encryption) Cost (Signature) + Cost (Encryption)
-
Advances in Cryptology - CRYPTO '97
-
Y. Zheng, "Digital signcryption or how to achieve cost (signature & encryption)
-
(1997)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1294
, pp. 165-179
-
-
Zheng, Y.1
-
5
-
-
84958948780
-
A signcryption scheme with signature directly verifiable by public key
-
Public Key Cryptography
-
F. Bao and R. H. Deng, "A signcryption scheme with signature directly verifiable by public key, " in Public Key Cryptography (Lecture Notes in Computer Science), vol. 1431. New York, NY, USA: Springer-Verlag, 1998, pp. 55-59. (Pubitemid 128101696)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1431
, pp. 55-59
-
-
Bao, F.1
Deng, R.H.2
-
6
-
-
35048817852
-
Encrypted message authentication by firewalls
-
New York, NY, USA: Springer-Verlag
-
C. Gamage, J. Leiwo, and Y. Zheng, "Encrypted message authentication by firewalls, " in Public Key Cryptography (Lecture Notes in Computer Science), vol. 1560. New York, NY, USA: Springer-Verlag, 1999, pp. 69-81.
-
(1999)
Public Key Cryptography (Lecture Notes in Computer Science)
, vol.1560
, pp. 69-81
-
-
Gamage, C.1
Leiwo, J.2
Zheng, Y.3
-
7
-
-
34347373013
-
Two birds one stone: Signcryption using rsa
-
New York, NY, USA: Springer-Verlag
-
J. Malone-Lee and W. Mao, "Two birds one stone: Signcryption using RSA, " in Topics in Cryptology (Lecture Notes in Computer Science), vol. 2612. New York, NY, USA: Springer-Verlag, 2003, pp. 211-226.
-
(2003)
Topics in Cryptology (Lecture Notes in Computer Science)
, vol.2612
, pp. 211-226
-
-
Malone-Lee, J.1
Mao, W.2
-
8
-
-
77954549125
-
An efficient signcryption scheme with key privacy and its extension to ring signcryption
-
C. K. Li, G. Yang, D. S. Wong, X. Deng, and S. S. M. Chow, "An efficient signcryption scheme with key privacy and its extension to ring signcryption, " J. Comput. Security, vol. 18, no. 3, pp. 451-473, 2010.
-
(2010)
J. Comput. Security
, vol.18
, Issue.3
, pp. 451-473
-
-
Li, C.K.1
Yang, G.2
Wong, D.S.3
Deng, X.4
Chow, S.S.M.5
-
9
-
-
84939205648
-
A new identity based signcryption schemes from pairings
-
B. Libert and J. J. Quisquater, "A new identity based signcryption schemes from pairings, " in Proc. IEEE Inf. Theory Workshop, Paris, France, 2003, pp. 155-158.
-
(2003)
Proc. IEEE Inf. Theory Workshop, Paris, France
, pp. 155-158
-
-
Libert, B.1
Quisquater, J.J.2
-
10
-
-
35048854673
-
Efficient forward and provably secure id-based signcryption scheme with public verifiability and public ciphertext authenticity
-
New York, NY, USA: Springer-Verlag
-
S. S. M. Chow, S. M. Yiu, L. C. K. Hui, and K. P. Chow, "Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity, " in Information Security and Cryptology (Lecture Notes in Computer Science), vol. 2971. New York, NY, USA: Springer-Verlag, 2004, pp. 352-369.
-
(2004)
Information Security and Cryptology (Lecture Notes in Computer Science)
, vol.2971
, pp. 352-369
-
-
Chow, S.S.M.1
Yiu, S.M.2
Hui, L.C.K.3
Chow, K.P.4
-
11
-
-
35248874429
-
Multipurpose identity-based signcryption: A Swiss army knife for identity-based cryptography
-
X. Boyen, "Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2729. New York, NY, USA: Springer-Verlag, 2003, pp. 383-399. (Pubitemid 137636954)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2729
, pp. 383-399
-
-
Boyen, X.1
-
12
-
-
24144498013
-
Improved identity-based signcryption
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
L. Chen and J. Malone-Lee, "Improved identity-based signcryption, " in Public Key Cryptography (Lecture Notes in Computer Science), vol. 3386. New York, NY, USA: Springer-Verlag, 2005, pp. 362-379. (Pubitemid 41231343)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 362-379
-
-
Chen, L.1
Malone-Lee, J.2
-
13
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
DOI 10.1007/11593447-28, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
P. S. L. M. Barreto, B. Libert, N. McCullagh, and J. J. Quisquater, "Efficient and provably-secure identity-based signatures and signcryp-tion from bilinear maps, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3788. New York, NY, USA: Springer-Verlag, 2005, pp. 515-532. (Pubitemid 43763493)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788 LNCS
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.-J.4
-
14
-
-
77952300651
-
Efficient signcryption between tpkc and idpkc and its multi-receiver construction
-
Mar.
-
Y. Sun and H. Li, "Efficient signcryption between TPKC and IDPKC and its multi-receiver construction, " Sci. China Inf. Sci., vol. 53, no. 3, pp. 557-566, Mar. 2010.
-
(2010)
Sci. China Inf. Sci.
, vol.53
, Issue.3
, pp. 557-566
-
-
Sun, Y.1
Li, H.2
-
15
-
-
84947237328
-
On the security of joint signature and encryption
-
New York, NY, USA: Springer-Verlag
-
J.H. An, Y. Dodis, and T. Rabin, "On the security of joint signature and encryption, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 2332. New York, NY, USA: Springer-Verlag, 2002, pp. 83-107.
-
(2002)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.2332
, pp. 83-107
-
-
An, J.H.1
Dodis, Y.2
Rabin, T.3
-
16
-
-
79953819495
-
Heterogeneous signcryption with key privacy
-
Apr.
-
Q. Huang, D. S. Wong, and G. Yang, "Heterogeneous signcryption with key privacy, " Comput. J., vol. 54, no. 4, pp. 525-536, Apr. 2011.
-
(2011)
Comput. J.
, vol.54
, Issue.4
, pp. 525-536
-
-
Huang, Q.1
Wong, D.S.2
Yang, G.3
-
17
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Jan.
-
D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures, " J. Cryptol., vol. 13, no. 3, pp. 361-396, Jan. 2000.
-
(2000)
J. Cryptol.
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
18
-
-
35048848152
-
Short signatures without random oracles
-
New York, NY, USA: Springer-Verlag
-
D. Boneh and X. Boyen, "Short signatures without random oracles, " in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3027. New York, NY, USA: Springer-Verlag, 2004, pp. 56-73.
-
(2004)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
19
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
J. C. Cha and J. H. Cheon, "An identity-based signature from gap Diffie-Hellman groups, " in Public Key Cryptography (Lecture Notes in Computer Science), vol. 2567. New York, NY, USA: Springer-Verlag, 2003, pp. 18-30. (Pubitemid 137638339)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
20
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
New York, NY, USA: Springer-Verlag
-
F. Hess, "Efficient identity based signature schemes based on pairings, " in Selected Areas in Cryptography (Lecture Notes in Computer Science), vol. 2595. New York, NY, USA: Springer-Verlag, 2003, pp. 310-324.
-
(2003)
Selected Areas in Cryptography (Lecture Notes in Computer Science)
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
21
-
-
37849018826
-
An efficient identity-based signature scheme and its applications
-
Jul.
-
S. Cui, P. Duan, C.W. Chan, and X. Cheng, "An efficient identity-based signature scheme and its applications, " Int. J. Netw. Security, vol. 5, no. 1, pp. 89-98, Jul. 2007.
-
(2007)
Int. J. Netw. Security
, vol.5
, Issue.1
, pp. 89-98
-
-
Cui, S.1
Duan, P.2
Chan, C.W.3
Cheng, X.4
-
22
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
New York, NY, USA: Springer-Verlag
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs, " in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science), vol. 3156. New York, NY, USA: Springer-Verlag, 2004, pp. 119-132.
-
(2004)
Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science)
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
23
-
-
70349154616
-
On the application of pairing based cryptography to wireless sensor networks
-
P. Szczechowiak, A. Kargl, M. Scott, and M. Collier, "On the application of pairing based cryptography to wireless sensor networks, " in Proc. 2nd ACM Conf. Wireless Netw. Security, Zurich, Switzerland, 2012, pp. 1-12.
-
(2012)
Proc. 2nd ACM Conf. Wireless Netw. Security, Zurich, Switzerland
, pp. 1-12
-
-
Szczechowiak, P.1
Kargl, A.2
Scott, M.3
Collier, M.4
-
24
-
-
84855178558
-
On the energy cost of authenticated key agreement in wireless sensor networks
-
Jan.
-
D. Galindo1, R. Roman, and J. Lopez, "On the energy cost of authenticated key agreement in wireless sensor networks, " Wireless Commun. Mobile Comput., vol. 12, no. 1, pp. 133-143, Jan. 2012.
-
(2012)
Wireless Commun. Mobile Comput.
, vol.12
, Issue.1
, pp. 133-143
-
-
Galindo, D.1
Roman, R.2
Lopez, J.3
|