1
Published 2010
Table of Contents: '; ...Introduction -- Part I  Security Models for Signcryption -- Security for Signcryption: The Two...
Get full text
Electronic
2
Published 2013
Table of Contents: '; ... -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption...
Get full text
Electronic
3
4
5
Published 2013
Table of Contents: '; ... Blind Ring Signatures without Random Oracles -- Constructions of Signcryption in the Multi-user Setting...
View fulltext via EzAccess
Electronic
6
Published 2013
Table of Contents: '; ...: Authenticated Group Key Agreement from Signcryption -- Privacy and Trust -- Classifying Online Social Network...
Get full text
Electronic
7
Published 2010
Table of Contents: '; ... Protection -- Signcryption with Non-interactive Non-repudiation without Random Oracles -- Block-Level Added...
Get full text
Electronic
8
Published 2013
Table of Contents: '; ... Remote User Authentication Scheme with Key Agreement Using Smart Card -- Signcryption from Randomness...
View fulltext via EzAccess
Electronic
9
Published 2004
Table of Contents: '; ... Sums -- A New Publicly Verifiable Proxy Signcryption Scheme -- Some New Proxy Signature Schemes from...
View fulltext via EzAccess
Electronic
10
Published 2013
Table of Contents: '; ... -- Improvement Public Key Kerberos using Identity-Based Signcryption -- Intrusion Detection Using Keystroke...
Get full text
Electronic