Results 151 to 158 of about 632 (158)
Some of the next articles are maybe not open access.
Certificateless Key Agreement Protocol
2010 2nd International Conference on E-business and Information System Security, 2010Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure.
openaire +1 more source
Certificateless Broadcast Multisignature for Network Coding
SSRN Electronic Journal, 2022Huifang Yu, Zhewei Qi
openaire +1 more source
Certificateless multivariate ring signcryption scheme
Journal of Information Security and Applications, 2022Huifang Yu, Shuai Zhang, Yue Liu
openaire +1 more source
Efficient Certificateless Hybrid Signcryption
Journal of Software, 2011Yin-Xia SUN, Hui LI
openaire +1 more source
Efficient certificateless signature scheme
Journal of Computer Applications, 2010Dong-zhao HONG, Qi XIE
openaire +1 more source
A Practical Certificateless Signature Scheme
The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007), 2007Lifeng Guo, Lei Hu, Yong Li
openaire +1 more source

