Delegated Anonymous Credentials With Revocation Capability for IoT Service Chains ( DANCIS ) | 0 | 0.34 | 2022 |
Dynamic Verifiable Encrypted Keyword Search - Using Bitmap Index. | 0 | 0.34 | 2018 |
Secure Cloud Storage and File Sharing | 0 | 0.34 | 2017 |
Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC | 1 | 0.35 | 2017 |
Forward Secure On-device Encryption Scheme Withstanding Cold Boot Attack | 1 | 0.35 | 2015 |
Practical IBE Secure under CBDH - Encrypting Without Pairing. | 0 | 0.34 | 2015 |
Controlled Proxy Re-signing - Conditional Proxy Re-Signatures. | 0 | 0.34 | 2015 |
An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks. | 0 | 0.34 | 2015 |
A Revocable Online-Offline Certificateless Signature Scheme without Pairing. | 0 | 0.34 | 2013 |
Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round | 0 | 0.34 | 2013 |
Efficient Certificateless Online/Offline Signature with tight security | 1 | 0.37 | 2013 |
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network. | 2 | 0.38 | 2012 |
ID based signcryption scheme in standard model | 6 | 0.42 | 2012 |
Group key establishment (GKE): Two/three party key exchange to GKE | 0 | 0.34 | 2012 |
PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction. | 1 | 0.35 | 2012 |
Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks. | 0 | 0.34 | 2012 |
Compact Stateful Encryption Schemes with Ciphertext Verifiability. | 2 | 0.39 | 2012 |
Deterministic identity based signature scheme and its application for aggregate signatures | 3 | 0.39 | 2012 |
Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model. | 0 | 0.34 | 2012 |
CCA2 Secure Certificateless Encryption Schemes Based on RSA. | 0 | 0.34 | 2011 |
Identity-based deterministic signature scheme without forking-lemma | 8 | 0.48 | 2011 |
Compact CCA-Secure Encryption with Ciphertext Verifiability. | 0 | 0.34 | 2011 |
Identity based online/offline encryption and signcryption schemes revisited | 5 | 0.45 | 2011 |
On the Security of ID Based Signcryption Schemes. | 4 | 0.41 | 2011 |
Identity Based Self Delegated Signature - Self Proxy Signatures | 0 | 0.34 | 2010 |
A Suite of Identity Based Aggregate Signatures and a Multi-Signature Scheme from RSA. | 2 | 0.37 | 2010 |
Identity Based Online/Offline Signcryption Scheme. | 6 | 0.47 | 2010 |
Identity based partial aggregate signature scheme without pairing | 5 | 0.45 | 2010 |
An Identity based Ring Signcryption Scheme with Public Verifiability. | 0 | 0.34 | 2010 |
On the Security of Identity Based Threshold Unsigncryption Schemes | 2 | 0.37 | 2010 |
Security Weaknesses in Two Certificateless Signcryption Schemes. | 1 | 0.35 | 2010 |
Identity Based Online/Offline Encryption Scheme. | 0 | 0.34 | 2010 |
Identity based public verifiable signcryption scheme | 10 | 0.51 | 2010 |
Certificateless KEM and hybrid signcryption schemes revisited | 6 | 0.51 | 2010 |
Identity Based Aggregate Signcryption Schemes | 10 | 0.57 | 2009 |
Scalable Compilers for Group Key Establishment : Two/Three Party to Group. | 2 | 0.38 | 2009 |
Cryptanalysis of certificateless signcryption schemes and an efficient construction without pairing | 6 | 0.46 | 2009 |
Breaking and Building of Group Inside Signature. | 0 | 0.34 | 2009 |
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme | 3 | 0.40 | 2009 |
On the Security of Identity Based Ring Signcryption Schemes | 5 | 0.46 | 2009 |
A note on the Certificateless Multi-receiver Signcryption Scheme. | 3 | 0.40 | 2009 |
Security Analysis of Aggregate signature and Batch verification signature schemes | 7 | 0.50 | 2009 |
Breaking and building of threshold signcryption schemes | 2 | 0.39 | 2009 |
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers | 14 | 0.68 | 2009 |
On the Security of Two Ring Signcryption Schemes. | 2 | 0.40 | 2009 |
Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme | 3 | 0.44 | 2008 |
Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. | 4 | 0.54 | 2008 |
cryptanalysis and Improvement of a Recently Proposed Remote User Authentication Scheme Using Smart Cards. | 0 | 0.34 | 2008 |
Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks | 2 | 0.41 | 2008 |
Efficient and Provably Secure Certificateless Multi-receiver Signcryption | 8 | 0.48 | 2008 |