Search Results

There are 23636 results for: content related to: A novel probabilistic signature based on bilinear square Diffie–Hellman problem and its extension

  1. Secure universal designated verifier identity-based signcryption

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 434–444, Changlu Lin, Fei Tang, Pinhui Ke, Lein Harn and Shengyuan Zhang

    Version of Record online : 28 JUN 2013, DOI: 10.1002/sec.820

  2. Efficient identity-based strong designated verifier signature schemes

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 902–911, Meijiao Duan, Jing Xu and Dengguo Feng

    Version of Record online : 26 NOV 2012, DOI: 10.1002/sec.645

  3. Signer-admissible strong designated verifier signature from bilinear pairings

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 422–428, Huaqun Wang

    Version of Record online : 14 JUN 2013, DOI: 10.1002/sec.805

  4. Analysis on the generalization of proxy signature

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 549–566, Namita Tiwari and Sahadeo Padhye

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.581

  5. Pairing-based strong designated verifier proxy signature scheme with low cost

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 517–522, Chien-Lung Hsu and Han-Yu Lin

    Version of Record online : 14 JUN 2011, DOI: 10.1002/sec.343

  6. One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1796–1809, Dennis Y. W. Liu and Duncan S. Wong

    Version of Record online : 4 JUL 2013, DOI: 10.1002/sec.812

  7. An efficient designated verifier signature scheme with pairing-free and low cost

    Security and Communication Networks

    Xiaoming Hu, Huajie Xu, Yan Liu, Jian Wang, Wenan Tan and Xiaojun Zhang

    Version of Record online : 16 JAN 2017, DOI: 10.1002/sec.1731

  8. A short and highly efficient identity-based designated verifier proxy signature scheme

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 907–916, Xiaoming Hu, Jian Wang, Huajie Xu and Wenan Tan

    Version of Record online : 15 JUN 2014, DOI: 10.1002/sec.1048

  9. A provably secure identity-based proxy ring signature based on RSA

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1223–1236, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh and Willy Susilo

    Version of Record online : 21 JUL 2014, DOI: 10.1002/sec.1076

  10. A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4650–4666, Ruhul Amin, SK Hafizul Islam, G.P. Biswas, Debasis Giri, Muhammad Khurram Khan and Neeraj Kumar

    Version of Record online : 20 OCT 2016, DOI: 10.1002/sec.1655

  11. Efficient oblivious transfer with adaptive queries in UC framework

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2592–2611, Vandana Guleria and Ratna Dutta

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1505

  12. New construction of affiliation-hiding authenticated group key agreement

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 723–734, Chang Xu, Hua Guo, Zhoujun Li and Yi Mu

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.606

  13. Certificateless aggregate signature with efficient verification

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2232–2243, Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang and Gwoboa Horng

    Version of Record online : 13 NOV 2014, DOI: 10.1002/sec.1166

  14. (Strong) multidesignated verifiers signatures secure against rogue key attack

    Concurrency and Computation: Practice and Experience

    Volume 26, Issue 8, 10 June 2014, Pages: 1574–1592, Man Ho Au, Guomin Yang, Willy Susilo and Yunmei Zhang

    Version of Record online : 5 JUL 2013, DOI: 10.1002/cpe.3094

  15. Generic constructions of secure-channel free searchable encryption with adaptive security

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1547–1560, Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman and Kazumasa Omote

    Version of Record online : 25 SEP 2014, DOI: 10.1002/sec.1103

  16. New efficient batch verification for an identity-based signature scheme

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2524–2535, Jung Yeon Hwang, Doo Ho Choi, Hyunsook Cho and Boyeon Song

    Version of Record online : 23 JAN 2015, DOI: 10.1002/sec.1194

  17. Efficient public key encryption with revocable keyword search

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 466–472, Yong Yu, Jianbing Ni, Haomiao Yang, Yi Mu and Willy Susilo

    Version of Record online : 24 MAY 2013, DOI: 10.1002/sec.790

  18. Towards fair mutual private set intersection with linear complexity

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1589–1612, Sumit Kumar Debnath and Ratna Dutta

    Version of Record online : 6 MAR 2016, DOI: 10.1002/sec.1450

  19. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Version of Record online : 1 JUN 2015, DOI: 10.1002/sec.1285

  20. Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.940