An Improved Forward Secure Elliptic Curve Signcryption Key Management Scheme for Wireless Sensor Networks
暂无分享,去创建一个
[1] Ramesh Kumar Mohapatra,et al. Signcryption Schemes With Forward Secrecy Based on Elliptic Curve Cryptography , 2010 .
[2] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[3] Yuliang Zheng,et al. Signcryption and Its Applications in Efficient Public Key Solutions , 1997, ISW.
[4] Yuliang Zheng,et al. Encrypted Message Authentication by Firewalls , 1999, Public Key Cryptography.
[5] Said E. El-Khamy,et al. New low complexity key exchange and encryption protocols for wireless sensor networks clusters based on Elliptic Curve Cryptography , 2009, 2009 National Radio Science Conference.
[6] Robert H. Deng,et al. A Signcryption Scheme with Signature Directly Verifiable by Public Key , 1998, Public Key Cryptography.
[7] Yuliang Zheng. Shortened Digital Signature, Signcryption and Compact and Unforgeable Key Agreement Schemes , 1998 .
[8] Mohsen Toorani,et al. An Elliptic Curve-based Signcryption Scheme with Forward Secrecy , 2009, ArXiv.
[9] Hideki Imai,et al. How to Construct Efficient Signcryption Schemes on Elliptic Curves , 1998, Inf. Process. Lett..
[10] Esam A. A. Hagras,et al. An Efficient Key Management Scheme based on Elliptic Curve Signcryption for Heterogeneous Wireless Sensor Networks , 2010 .
[11] Esam A. A. A. Hagras,et al. Energy efficient key management scheme based on elliptic curve signcryption for Wireless Sensor Networks , 2011, 2011 28th National Radio Science Conference (NRSC).
[12] Ren-Junn Hwang,et al. An efficient signcryption scheme with forward secrecy based on elliptic curve , 2005, Appl. Math. Comput..
[13] Rack-hyun Kim,et al. Secure Authenticated Key Exchange protocol based on EC using Signcryption Scheme , 2006, 2006 International Conference on Hybrid Information Technology.
[14] Xuanwu Zhou,et al. Improved Signcryption Scheme with Public Verifiability , 2009, 2009 Pacific-Asia Conference on Knowledge Engineering and Software Engineering.
[15] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[16] Hassan M. Elkamchouchi,et al. Elliptic Curve Signcryption with Encrypted Message Authentication and Forward Secrecy , 2009 .