-
1
-
-
84879687830
-
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
-
Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 66(2):165–178
-
(2013)
Multimed Tools Appl
, vol.66
, Issue.2
, pp. 165-178
-
-
Arshad, R.1
Ikram, N.2
-
2
-
-
84874148363
-
An improved forward secure elliptic curve signcryption key management scheme for wireless sensor networks. In: IT convergence and security 2012. Springer
-
Bala S, Sharma G, Verma AK (2013) An improved forward secure elliptic curve signcryption key management scheme for wireless sensor networks. In: IT convergence and security 2012. Springer, pp 141–149
-
(2013)
pp 141–149
-
-
Bala, S.1
Sharma, G.2
Verma, A.K.3
-
3
-
-
84958948780
-
A signcryption scheme with signature directly verifiable by public key. In: Public key cryptography. Springer
-
Bao F, Deng RH (1998) A signcryption scheme with signature directly verifiable by public key. In: Public key cryptography. Springer, pp 55–59
-
(1998)
pp 55–59
-
-
Bao, F.1
Deng, R.H.2
-
4
-
-
84861166810
-
Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In: Information systems, technology and management, communications in computer and information science, vol 285. Springer Berlin Heidelberg
-
Ch SA, uddin N, Sher M (2012) Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In: Information systems, technology and management, communications in computer and information science, vol 285. Springer Berlin Heidelberg, pp 135–142
-
(2012)
pp 135–142
-
-
Ch, S.A.1
uddin, N.2
Sher, M.3
-
5
-
-
84925493265
-
A hybrid encryption technique for digital holography using DCT and DWT
-
Choi HJ, Seo YH, Kim DW (2011) A hybrid encryption technique for digital holography using DCT and DWT. J Inf Commun Converg Eng 9(3):271–275
-
(2011)
J Inf Commun Converg Eng
, vol.9
, Issue.3
, pp. 271-275
-
-
Choi, H.J.1
Seo, Y.H.2
Kim, D.W.3
-
6
-
-
84906780265
-
Extended key management scheme for dynamic group in multi-cast communication
-
Degefa FB, Won D (2013) Extended key management scheme for dynamic group in multi-cast communication. J Converg 4(4):7–13
-
(2013)
J Converg
, vol.4
, Issue.4
, pp. 7-13
-
-
Degefa, F.B.1
Won, D.2
-
7
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Diffie W, Oorschot PCV, Wiener JM (1992) Authentication and authenticated key exchanges. Des Codes Crypt 2:107–125
-
(1992)
Des Codes Crypt
, vol.2
, pp. 107-125
-
-
Diffie, W.1
-
8
-
-
35048817852
-
Encrypted message authentication by firewalls. In: Lecture notes computer science (LNCS), PKC99, vol 1560. Springer-Verlag
-
Gamage C, Leiwo J, Zheng Y (1999) Encrypted message authentication by firewalls. In: Lecture notes computer science (LNCS), PKC99, vol 1560. Springer-Verlag, pp 69–81
-
(1999)
pp 69–81
-
-
Gamage, C.1
Leiwo, J.2
Zheng, Y.3
-
9
-
-
73849126237
-
A novel hybrid security model for e-commerce channel. In: International conference on advances in recent technologies in communication and computing, 2009. ARTCom’09. IEEE
-
Ganesan R, Vivekanandan K (2009) A novel hybrid security model for e-commerce channel. In: International conference on advances in recent technologies in communication and computing, 2009. ARTCom’09. IEEE, pp 293–296
-
(2009)
pp 293–296
-
-
Ganesan, R.1
Vivekanandan, K.2
-
10
-
-
80052853191
-
A novel digital envelope approach for a secure e-commerce channel
-
Ganesan R, Gobi M, Vivekanandan K (2010) A novel digital envelope approach for a secure e-commerce channel. Int J Netw Secur 11(3):121–127
-
(2010)
Int J Netw Secur
, vol.11
, Issue.3
, pp. 121-127
-
-
Ganesan, R.1
Gobi, M.2
Vivekanandan, K.3
-
11
-
-
25144467465
-
An efficient signcryption scheme with forward secrecy based on elliptic curve
-
Hwang RJ, Lai CH, Su FF (2005) An efficient signcryption scheme with forward secrecy based on elliptic curve. Appl Math Comput 167(2):870–881
-
(2005)
Appl Math Comput
, vol.167
, Issue.2
, pp. 870-881
-
-
Hwang, R.J.1
Lai, C.H.2
Su, F.F.3
-
12
-
-
84904860928
-
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
-
Irshad A, Sher M, Faisal MS, Ghani A, Ul Hassan M, Ashraf Ch S (2013) A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Security and Communication Networks 7(8):1210–1218
-
(2013)
Security and Communication Networks
, vol.7
, Issue.8
, pp. 1210-1218
-
-
Irshad, A.1
Sher, M.2
Faisal, M.S.3
Ghani, A.4
Ul Hassan, M.5
Ashraf Ch, S.6
-
13
-
-
84929841169
-
A single round-trip sip authentication scheme for voice over internet protocol using smart card
-
Irshad A, Sher M, Rehman E, Ch SA, Hassan MU, Ghani A (2013) A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimedia Tools Appl:1–18
-
(2013)
Multimedia Tools Appl
, pp. 1-18
-
-
Irshad, A.1
Sher, M.2
Rehman, E.3
Ch, S.A.4
Hassan, M.U.5
Ghani, A.6
-
14
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36–63
-
(2001)
Int J Inf Secur
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
15
-
-
0024864204
-
Hyperelliptic cryptosystems
-
Koblitz N (1989) Hyperelliptic cryptosystems. J Cryptol 1(3):139–150
-
(1989)
J Cryptol
, vol.1
, Issue.3
, pp. 139-150
-
-
Koblitz, N.1
-
16
-
-
84866660545
-
An efficient key agreement with rekeying for secured body sensor networks. In: 2nd international conference on digital information processing and communications (ICDIPC), 2012. IEEE
-
Mehmood Z, Nizamuddin N, Ch S, Nasar W, Ghani A (2012) An efficient key agreement with rekeying for secured body sensor networks. In: 2nd international conference on digital information processing and communications (ICDIPC), 2012. IEEE, pp 164–167
-
(2012)
pp 164–167
-
-
Mehmood, Z.1
Nizamuddin, N.2
Ch, S.3
Nasar, W.4
Ghani, A.5
-
17
-
-
84925516389
-
Signcryption schemes with forward secrecy based on elliptic curve cryptography. Ph.D
-
Mohapatra RK (2010) Signcryption schemes with forward secrecy based on elliptic curve cryptography. Ph.D. thesis
-
(2010)
thesis
-
-
Mohapatra, R.K.1
-
19
-
-
80755159505
-
Efficient signcryption schemes based on hyperelliptic curve cryptosystem
-
Nizamuddin, Ch SA, Nasar W, Javaid Q (2011) Efficient signcryption schemes based on hyperelliptic curve cryptosystem. In: 7th international conference on emerging technologies (ICET), 2011, pp 1–4
-
(2011)
7th international conference on emerging technologies (ICET)
, vol.2011
, pp. 1-4
-
-
Nizamuddin, C.S.A.1
Nasar, W.2
Javaid, Q.3
-
20
-
-
84874179353
-
An identity-based ring signcryption scheme. In: IT convergence and security 2012. Springer
-
Sharma G, Bala S, Verma AK (2013) An identity-based ring signcryption scheme. In: IT convergence and security 2012. Springer, 151–157
-
(2013)
151–157
-
-
Sharma, G.1
Bala, S.2
Verma, A.K.3
-
21
-
-
84874930356
-
Voip encryption module for securing privacy
-
Son B, Nahm E, Kim H (2013) Voip encryption module for securing privacy. Multimedia Tools Appl 63(1):181–193. doi:10.1007/s11042-011-0956-1
-
(2013)
Multimedia Tools Appl
, vol.63
, Issue.1
, pp. 181-193
-
-
Son, B.1
Nahm, E.2
Kim, H.3
-
23
-
-
84888645672
-
An enhanced encryption algorithm for video based on multiple huffman tables
-
Varalakshmi L, Florence SG (2013) An enhanced encryption algorithm for video based on multiple huffman tables. Multimedia Tools Appl 64(3):717–729
-
(2013)
Multimedia Tools Appl
, vol.64
, Issue.3
, pp. 717-729
-
-
Varalakshmi, L.1
Florence, S.G.2
-
24
-
-
77955606987
-
Effective generalized equations of secure hyperelliptic curve digital signature algorithms
-
You L, Sang YX (2010) Effective generalized equations of secure hyperelliptic curve digital signature algorithms. J China Univ Posts Telecommun 17(2):100–115
-
(2010)
J China Univ Posts Telecommun
, vol.17
, Issue.2
, pp. 100-115
-
-
You, L.1
Sang, Y.X.2
-
25
-
-
84866369580
-
An efficient medical image cryptosystem based on chaotic maps
-
Zhan YF, Feng X, Fu C, Bai GT, Ma HF (2012) An efficient medical image cryptosystem based on chaotic maps. Int J Digit Content Tech Appl 6(13):265–274
-
(2012)
Int J Digit Content Tech Appl
, vol.6
, Issue.13
, pp. 265-274
-
-
Zhan, Y.F.1
Feng, X.2
Fu, C.3
Bai, G.T.4
Ma, H.F.5
-
26
-
-
85018102575
-
A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
-
Zhang Z, Qi Q, Kumar N, Chilamkurti N, Jeong HY (2014) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimedia Tools Appl:1–12
-
(2014)
Multimedia Tools Appl
, pp. 1-12
-
-
Zhang, Z.1
Qi, Q.2
Kumar, N.3
Chilamkurti, N.4
Jeong, H.Y.5
-
27
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption). In: Advances in cryptologyCRYPTO’97. Springer
-
Zheng Y (1997) Digital signcryption or how to achieve cost (signature & encryption) << cost (signature) + cost (encryption). In: Advances in cryptologyCRYPTO’97. Springer, pp 165–179
-
(1997)
pp 165–179
-
-
Zheng, Y.1
-
28
-
-
0040712314
-
How to construct efficient signcryption schemes on elliptic curves
-
Zheng Y, Imai H (1998) How to construct efficient signcryption schemes on elliptic curves. Inf Process Lett 68(5):227–233
-
(1998)
Inf Process Lett
, vol.68
, Issue.5
, pp. 227-233
-
-
Zheng, Y.1
Imai, H.2
|