Suggested Topics within your search.
Suggested Topics within your search.
1
Published 2010
Table of Contents: ';
“...Introduction -- Part I Security Models for Signcryption -- Security for Signcryption: The Two...”Get full text
Electronic
2
Published 2013
Table of Contents: ';
“... -- k-Time Proxy Signature: Formal Definition and Efficient Construction -- Anonymous Signcryption...”Get full text
Electronic
3
4
5
Published 2013
Table of Contents: ';
“... Blind Ring Signatures without Random Oracles -- Constructions of Signcryption in the Multi-user Setting...”View fulltext via EzAccess
Electronic
6
Published 2013
Table of Contents: ';
“...: Authenticated Group Key Agreement from Signcryption -- Privacy and Trust -- Classifying Online Social Network...”Get full text
Electronic
7
Published 2010
Table of Contents: ';
“... Protection -- Signcryption with Non-interactive Non-repudiation without Random Oracles -- Block-Level Added...”Get full text
Electronic
8
Published 2013
Table of Contents: ';
“... Remote User Authentication Scheme with Key Agreement Using Smart Card -- Signcryption from Randomness...”View fulltext via EzAccess
Electronic
9
Published 2004
Table of Contents: ';
“... Sums -- A New Publicly Verifiable Proxy Signcryption Scheme -- Some New Proxy Signature Schemes from...”View fulltext via EzAccess
Electronic
10
Published 2013
Table of Contents: ';
“... -- Improvement Public Key Kerberos using Identity-Based Signcryption -- Intrusion Detection Using Keystroke...”Get full text
Electronic