Results 121 to 130 of about 632 (158)
The applications of internet of things in smart healthcare sectors: a bibliometric and deep study. [PDF]
Ziwei H +6 more
europepmc +1 more source
Lightweight identity authentication and key agreement scheme for VANETs based on SSL-PUF. [PDF]
Li X, Li M, Xu L, Xie J, Shi R, Feng H.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 16th ACM conference on Computer and communications security, 2009
Onion routing protocols allow users to establish anonymous channels to preserve their privacy over a public network. Several protocols implementing this primitive have been proposed in recent years, and TOR, a real-life implementation, provides an onion routing service to thousands of users over the internet.This paper presents Certificateless Onion ...
CATALANO, Dario +2 more
openaire +1 more source
Onion routing protocols allow users to establish anonymous channels to preserve their privacy over a public network. Several protocols implementing this primitive have been proposed in recent years, and TOR, a real-life implementation, provides an onion routing service to thousands of users over the internet.This paper presents Certificateless Onion ...
CATALANO, Dario +2 more
openaire +1 more source
Certificateless Threshold Ring Signature
Information Sciences, 2009zbMATH Open Web Interface contents unavailable due to conflicting licenses.
chang, shuang +3 more
openaire +2 more sources
On constructing certificateless proxy signature from certificateless signature
Journal of Shanghai Jiaotong University (Science), 2008In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A. The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.
Zhong-mei Wan +5 more
openaire +1 more source
Efficient Certificateless Signcryption
Anais Estendidos do VIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg Estendido 2008), 2008This article does not have an abstract.
Diego Aranha +3 more
openaire +1 more source
Hierarchical Certificateless Signatures
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In this paper, to incorporate the advantages of both types of cryptosystems, we instantiate hierarchical certificate less cryptography by ...
Lei Zhang +3 more
openaire +1 more source
Efficient Certificateless Proxy Signature Scheme
International Journal of Foundations of Computer Science, 2016A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. We propose a certificateless proxy signature (CLPS) scheme, and prove it's security under a stronger security model. Although some good results were achieved in speeding up the computation of pairing function in recent years, it is ...
Deng, Lunzhi, Zeng, Jiwen, Huang, Huawei
openaire +1 more source

