Results 151 to 158 of about 632 (158)
Some of the next articles are maybe not open access.

Certificateless Key Agreement Protocol

2010 2nd International Conference on E-business and Information System Security, 2010
Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure.
openaire   +1 more source

Certificateless Broadcast Multisignature for Network Coding

SSRN Electronic Journal, 2022
Huifang Yu, Zhewei Qi
openaire   +1 more source

Certificateless multivariate ring signcryption scheme

Journal of Information Security and Applications, 2022
Huifang Yu, Shuai Zhang, Yue Liu
openaire   +1 more source

Efficient Certificateless Hybrid Signcryption

Journal of Software, 2011
Yin-Xia SUN, Hui LI
openaire   +1 more source

Introduction to Certificateless Cryptography

2016
Hu Xiong   +2 more
openaire   +1 more source

Efficient certificateless signature scheme

Journal of Computer Applications, 2010
Dong-zhao HONG, Qi XIE
openaire   +1 more source

A Practical Certificateless Signature Scheme

The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007), 2007
Lifeng Guo, Lei Hu, Yong Li
openaire   +1 more source

Home - About - Disclaimer - Privacy