Results 121 to 130 of about 632 (158)

The applications of internet of things in smart healthcare sectors: a bibliometric and deep study. [PDF]

open access: yesHeliyon
Ziwei H   +6 more
europepmc   +1 more source

Certificateless Hybrid Signcryption

open access: yesCertificateless Hybrid Signcryption
openaire  

Certificateless onion routing

Proceedings of the 16th ACM conference on Computer and communications security, 2009
Onion routing protocols allow users to establish anonymous channels to preserve their privacy over a public network. Several protocols implementing this primitive have been proposed in recent years, and TOR, a real-life implementation, provides an onion routing service to thousands of users over the internet.This paper presents Certificateless Onion ...
CATALANO, Dario   +2 more
openaire   +1 more source

Certificateless Threshold Ring Signature

Information Sciences, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
chang, shuang   +3 more
openaire   +2 more sources

On constructing certificateless proxy signature from certificateless signature

Journal of Shanghai Jiaotong University (Science), 2008
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A. The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.
Zhong-mei Wan   +5 more
openaire   +1 more source

Efficient Certificateless Signcryption

Anais Estendidos do VIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg Estendido 2008), 2008
This article does not have an abstract.
Diego Aranha   +3 more
openaire   +1 more source

Hierarchical Certificateless Signatures

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In this paper, to incorporate the advantages of both types of cryptosystems, we instantiate hierarchical certificate less cryptography by ...
Lei Zhang   +3 more
openaire   +1 more source

Efficient Certificateless Proxy Signature Scheme

International Journal of Foundations of Computer Science, 2016
A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer within a given context. We propose a certificateless proxy signature (CLPS) scheme, and prove it's security under a stronger security model. Although some good results were achieved in speeding up the computation of pairing function in recent years, it is ...
Deng, Lunzhi, Zeng, Jiwen, Huang, Huawei
openaire   +1 more source

Home - About - Disclaimer - Privacy