共 50 条
- [21] UC secure signcryption protocol with public verifiability Dongnan Daxue Xuebao, 2008, SUPPL. 1 (55-58):
- [22] Comments on "Provably Secure Generalized Signcryption Scheme With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices" IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 4666 - 4670
- [23] Efficient identity based proxy-signcryption schemes with forward security and public verifiability NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 982 - 991
- [24] A provably secure and efficient certificateless signcryption scheme Sun, H. (sh1227@163.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
- [25] Secure delegation-by-warrant ID-based proxy signcryption scheme COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
- [26] Secure ID-based proxy signcryption scheme with designated proxy signcrypter MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
- [27] Cryptanalysis and improvement of a signcryption scheme with public verifiability Tien Tzu Hsueh Pao, 2006, 1 (177-179):
- [28] Revocable ID-based signcryption scheme Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (02): : 79 - 86
- [29] An ID-based broadcast signcryption scheme Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2012, 44 (01): : 118 - 122
- [30] IBASC: Identity based aggregate signcryption scheme with public verifiability ICIC Express Letters, 2013, 7 (07): : 2075 - 2080