Universally Verifiable Certificateless Signcryption Scheme for MANET
暂无分享,去创建一个
[1] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[2] Baocang Wang,et al. Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks , 2013, Secur. Commun. Networks.
[3] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[4] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[5] Lung-Chung Li,et al. Securing Cluster-Based Ad Hoc Networks with Distributed Authorities , 2010, IEEE Transactions on Wireless Communications.
[6] He De. Security Analysis of a Certificateless Signcryption Scheme , 2013 .
[7] Yuguang Fang,et al. Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.
[8] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[9] Manuel Barbosa,et al. Certificateless signcryption , 2008, ASIACCS '08.
[10] Pramod Kumar Soni,et al. A Survey of Mobile Ad Hoc Network Attacks , 2013 .
[11] Fuyou Miao,et al. Fully Self-organized Key Management Scheme in MANET and Its Applications , 2013 .
[12] Zhenfei Zhang,et al. Mobile ad-hoc network key management with certificateless cryptography , 2008, 2008 2nd International Conference on Signal Processing and Communication Systems.
[13] Zezhong Zhang,et al. Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing , 2014, Frontiers of Computer Science.
[14] Imrich Chlamtac,et al. Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.
[15] Zhang Zhang,et al. Efficient and provably secure certificateless signcryption from bilinear maps , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.
[16] Chun-Xiang Xu,et al. Certificateless Signcryption Scheme Without Bilinear Pairing: Certificateless Signcryption Scheme Without Bilinear Pairing , 2011 .
[17] Sangjin Kim,et al. ID-based key management scheme using threshold decryption for OPMD environment , 2012, 2012 IEEE International Conference on Consumer Electronics (ICCE).
[18] De-Biao He. Security Analysis of a Certificateless Signcryption Scheme: Security Analysis of a Certificateless Signcryption Scheme , 2014 .
[19] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[20] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[21] Wang Bin. (t,n) Threshold Signature Scheme Without a Trusted Party , 2003 .
[22] Shi Lin,et al. A New Certificateless Signcryption Scheme Without Bilinear Pairing , 2018, 2018 13th International Conference on Computer Science & Education (ICCSE).
[23] Luca Viganò,et al. Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.