Editorial for the Special Issue on Micro Air Vehicles. [PDF]
Mohsan SAH, Khan MA, Karatas M.
europepmc +1 more source
Fair exchange in e-commerce and certified e-mail, new scenarios and protocols [PDF]
We are witnessing a steady growth in the use of Internet in the electronic commerce field. This rise is promoting the migration from traditional processes and applications (paper based) to an electronic model.
Departament de Ciències Matemàtiques i Informàtica +1 more
core
Identity based cryptography from pairings. [PDF]
Yuen Tsz Hon.Thesis (M.Phil.)--Chinese University of Hong Kong, 2006.Includes bibliographical references (leaves 109-122).Abstracts in English and Chinese.Abstract --- p.iAcknowledgement --- p.iiiList of Notations --- p.viiiChapter 1 --- Introduction -
core
An Improved Certificateless Generalized Signcryption Scheme [PDF]
Signcryption is basically a cryptographic primitive which provides both signature and encryption functions simultaneously, but it is not useful when only one of the function is required. Generalized Signcryption (GSC) is a special cryptographic primitive
Rout, Jitendra Kumar
core
A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems. [PDF]
Sripathi Venkata Naga SK +3 more
europepmc +1 more source
An Efficient Heterogeneous Ring Signcryption Scheme for Wireless Body Area Networks
Qingqing Ning +4 more
semanticscholar +1 more source
Signcryption schemes based on elliptic curve cryptography [PDF]
Signcryption is cryptographic primitive which simultaneously provide both the function of digital signature and public key encryption in a single logical step.
Nayak, B
core
Design of periodic deniable ring signcryption scheme based on SM9
To address the conflict between privacy protection and responsibility tracing in traditional cryptographic schemes, a periodic deniable ring signcryption scheme based on SM9 was proposed.
Zhang Yanshuo +4 more
doaj
An ID-based Anonymous Signcryption Scheme With Self-verifiability For General Access Structure [PDF]
基于身份的环签密结合了环签名和基于身份的签密这两种密码体制的优点,实现了以既保密又匿名认证的方式传输信息,但在传统的基于身份的环签密方案中,通常只考虑用户群是由多个单一用户组成的情况,而未考虑群中的用户是由成员个数不同的“小群体”构成的情况。 据此本文利用双线性对构造了一个在访问结构上的基于身份的匿名签密方案,并在随机预言模型中给出了安全性的证明。同时该方案具有消息的保密性、不可伪造性、签密者身份的模糊性、公开可验证性、可自证性。 本文的结构安排如下: 第一章介绍论文的研究背景以及论文的主要工作 ...
刘文娟
core
A Review of Functional Encryption in IoT Applications. [PDF]
Shahzad K, Zia T, Qazi EU.
europepmc +1 more source

