-
1
-
-
77952181307
-
Anal-ysis of public-key cryptography for wireless sensor networks security
-
World Academy of Science, Engineering and Technology
-
F. Amin, A. H Jahangir, and H. Rasifard. "Anal-ysis of public-key cryptography for wireless sensor networks security,". tech. rep., World Academy of Science, Engineering and Technology, 2008.
-
(2008)
tech. rep.
-
-
Amin, F.1
Jahangir, A.H.2
Rasifard, H.3
-
2
-
-
56349132859
-
Ordered multi-signatures and identity-based sequential aggregate signatures, with applications to secure routing,
-
A. Boldyreva, C. Gentry, A. Neill, and D. H. Yum, "Ordered multi-signatures and identity-based sequential aggregate signatures, with applications to secure routing," in Proceedings of ACM Conference on Computer and Communications Security, pp. 257{273, 2007.
-
(2007)
in Proceedings of ACM Conference on Computer and Communications Security
, pp. 257-273
-
-
Boldyreva, A.1
Gentry, C.2
Neill, A.3
Yum, D.H.4
-
4
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps," in Proceedings of Eurocrypt '03, vol. LNCS2656, pp. 416-432, 2003.
-
(2003)
in Proceedings of Eurocrypt '03
, vol.LNCS 2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
5
-
-
24944433217
-
Identity-based aggregate and verifiably encrypted signatures from bilinear pairing
-
X. Cheng, J. Liu, and X. Wang, "Identity-based aggregate and verifiably encrypted signatures from bilinear pairing," in Proceedings of ICCSA, vol. LNCS 3483, pp. 1046-1054, 2005.
-
(2005)
in Proceedings of ICCSA
, vol.LNCS 3483
, pp. 1046-1054
-
-
Cheng, X.1
Liu, J.2
Wang, X.3
-
6
-
-
71149116424
-
An efficient identity-based signature scheme with batch verifications
-
S. Cui, P. Duan, and C. W. Chan, "An efficient identity-based signature scheme with batch verifications," in Proceedings of Infoscale, ACM International Conference, vol. 152, p. 22, 2006.
-
(2006)
in Proceedings of Infoscale, ACM International Conference
, vol.152
, pp. 22
-
-
Cui, S.1
Duan, P.2
Chan, C.W.3
-
7
-
-
30344445246
-
Enhancing base station security in wireless sensor netowrks: University of colorado, department of computer science. technical report cu-us-951-03
-
J. Deng, R. Han, and S. Mishra. "Enhancing base station security in wireless sensor netowrks: University of colorado, department of computer science. technical report cu-us-951-03,". tech. rep.
-
tech. rep.
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
8
-
-
85028913061
-
On-line/off-line digital signatures
-
Barlin, June
-
S. Even, O. Goldreich, and S. Micali, "On-line/off-line digital signatures," in Proceedings of Advances in Cryptology, vol. LNcs 435, pp. 263-180, Barlin, June 1990.
-
(1990)
in Proceedings of Advances in Cryptology, vol. LNcs 435
, pp. 263-180
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
9
-
-
33745849655
-
dentity-based aggregate signatures
-
C. Gentry and Z. Ramzan, "dentity-based aggregate signatures," in Proceedings of PKC 2006, vol. LNCS 3958, pp. 257-273, 2006.
-
(2006)
in Proceedings of PKC 2006
, vol.LNCS 3958
, pp. 257-273
-
-
Gentry, C.1
Ramzan, Z.2
-
10
-
-
33646251408
-
Deterministic identity-based signatures for partial aggregation
-
PAGES =, 2006
-
J. Herranz, "Deterministic identity-based signatures for partial aggregation," The Computer Journal, vol. 49, no. 3, PAGES =, 2006.
-
The Computer Journal
, vol.49
, Issue.3
-
-
Herranz, J.1
-
11
-
-
77952324001
-
Universal forgery of the identity-based sequential aggregate signature scheme
-
J. Y. Hwang, D. H. Lee, and M. Yung, "Universal forgery of the identity-based sequential aggregate signature scheme," in ASIACCS, pp. 157-160.
-
in ASIACCS
, pp. 157-160
-
-
Hwang, J.Y.1
Lee, D.H.2
Yung, M.3
-
12
-
-
84893559210
-
Efficient online/off-ine identity-based signature for wireless sensor network
-
IACR eprint-2010/03
-
J. K. Liu, J. Baek, J. Zhou, Y. Yang, and J. W. Wong. "Efficient online/off-ine identity-based signature for wireless sensor network,". Tech. Rep. IACR eprint-2010/03, 2010.
-
(2010)
Tech. Rep.
-
-
Liu, J.K.1
Baek, J.2
Zhou, J.3
Yang, Y.4
Wong, J.W.5
-
13
-
-
84893522291
-
Sequential aggregate signatures and multi-signatures without random oracles
-
S. Lu, R. Ostrovsky, A. Sahai, H. Shacham, and B. Waters, "Sequential aggregate signatures and multi-signatures without random oracles," in Proceedings of Eurocrypt '06.
-
in Proceedings of Eurocrypt '06
-
-
Lu, S.1
Ostrovsky, R.2
Sahai, A.3
Shacham, H.4
Waters, B.5
-
14
-
-
77649252131
-
Security analysis of aggregate signature and batch verification signature schemes
-
IACR eprint-2009/290
-
S. S. D. Selvi, S. S. Vivek, J. Shriram, S. Kalaivani, and C.Pandu Rangan. "Security analysis of aggregate signature and batch verification signature schemes,". Tech. Rep. IACR eprint-2009/290, 2009.
-
(2009)
Tech. Rep.
-
-
Selvi, S.S.D.1
Vivek, S.S.2
Shriram, J.3
Kalaivani, S.4
Pandu Rangan, C.5
-
15
-
-
84893563476
-
Wireless sensor networks: Principles and applications microstrain
-
C. Townsend and S. Arms. "Wireless sensor networks: Principles and applications microstrain,". tech. rep.
-
tech. rep.
-
-
Townsend, C.1
Arms, S.2
-
16
-
-
79951478259
-
An aggregate signature scheme with constant pairing operations
-
Y. Wen and J. Ma, "An aggregate signature scheme with constant pairing operations," in CSSE, vol. 3, pp. 830-833, 2008.
-
(2008)
in CSSE, vol. 3
, pp. 830-833
-
-
Wen, Y.1
Ma, J.2
-
18
-
-
24944445896
-
Batch verifications with id-based signatures
-
vol. LNCS 3506
-
H. Yoon, J. H. Cheon, and Y. Kim, "Batch verifications with id-based signatures," in Proceedings of ICISC, vol. LNCS 3506, pp. 233-248, 2004.
-
(2004)
in Proceedings of ICISC
, pp. 233-248
-
-
Yoon, H.1
Cheon, J.H.2
Kim, Y.3
|