Results 141 to 150 of about 1,535 (180)

Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks

open access: yesKey Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
openaire  

Two-party authenticated key agreement in certificateless public key cryptography

Wuhan University Journal of Natural Sciences, 2007
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. It combines the advantages of the identity-based cryptography and the traditional PKI. Many certificateless public key encryption and signature schemes have been proposed.
Yijuan Shi, Jianhua Li
openaire   +3 more sources

Home - About - Disclaimer - Privacy