-
1
Research of STR multicast key management protocol based on bilinear pairing in ad hoc network
Published 2008-01-01Subjects: Get full text
Article -
2
Efficient method of constructing parameters in R-ate paring
Published 2010-01-01Subjects: “…bilinear pairing…”
Get full text
Article -
3
Efficient identification protocol provably secure in standard model
Published 2009-01-01Subjects: Get full text
Article -
4
Design of United Identity Authentication and Key Agreement Protocol for Hybrid Cloud
Published 2014-04-01Subjects: Get full text
Article -
5
Security analysis and improvement of a certificateless signcryption scheme
Published 2015-03-01Subjects: Get full text
Article -
6
Provably secure secret sharing scheme based on bilinear maps
Published 2008-01-01Subjects: Get full text
Article -
7
-
8
Constant-round fair rational secret sharing scheme
Published 2017-01-01Subjects: Get full text
Article -
9
-
10
-
11
Provably secure partially blind signature without trusted PKG
Published 2010-01-01Subjects: Get full text
Article -
12
Efficiency identity-based threshold group signature scheme
Published 2009-01-01Subjects: Get full text
Article -
13
Certificateless signature scheme without bilinear pairings
Published 2012-04-01Subjects: Get full text
Article -
14
Research on batch anonymous authentication scheme for VANET based on bilinear pairing
Published 2017-06-01Subjects: “…bilinear pairing…”
Get full text
Article -
15
Dual-proxy key-based threshold signature scheme for ship ad-hoc network
Published 2018-07-01Subjects: Get full text
Article -
16
Security analysis and improvement of strongly secure certificate less signature scheme
Published 2014-05-01Subjects: Get full text
Article -
17
Certificateless strong designated verifier multi-signature
Published 2016-06-01Subjects: Get full text
Article -
18
ID-based on-line/off-line threshold signature scheme without bilinear pairing
Published 2013-08-01Subjects: Get full text
Article -
19
ID-based transitive signature schemes without random oracle
Published 2010-01-01Subjects: Get full text
Article -
20
Universally composable secure multiparty computation protocol with fairness
Published 2014-02-01Subjects: Get full text
Article