Results 91 to 100 of about 12,362 (163)

Session Initiation Protocol Attacks and Challenges

open access: yes, 2012
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan   +2 more
core  

Efficient traceable identity-based signature scheme

open access: yesTongxin xuebao, 2009
The inherent key escrow problem is a main disadvantage in identity-based signature schemes. The concept and security model of traceable identity-based signature (T-IBS) was introduced which was a new approach to mitigate the key escrow problem in ...
DU Hong-zhen1, WEN Qiao-yan2
doaj   +2 more sources

Efficient certificateless multi-receiver anonymous signcryption scheme

open access: yesTongxin xuebao, 2016
To solve the private key escrow problem of identity-based multi-receiver signcryption schemes,the security model for multi-receiver signcryption scheme was constructed,and then a certificateless multi-receiver signcryption scheme based on ECC was ...
Yan-lin QIN, Xiao-ping WU, Wei HU
doaj   +2 more sources

Home - About - Disclaimer - Privacy