In network security, firewall is a security system that observes and controls the network traffic based on some predefined rules. A firewall sets up a barrier between internal network and another outside unsecured network, such as the Internet. A number of signcryption schemes for firewall are proposed over the years, many of them are proved to have security flaws. In this paper, an elliptic curve based signcryption scheme for firewalls is analyzed. It is observed that the scheme is not secure and has many security flaws. Anyone who knows the public parameters, can modify the message without the knowledge of sender and receiver. The claimed security attributes of non-repudiation, unforgeability, integrity and authentication are compromised....
With the rapid growth in internet technology anonymity, repudiation and smacking the contents of mes...
ABSTRACT In order to obtain promising wireless communication systems, it is necessary to maintain s...
Signcryption is a new cryptographic technology which provides both confidentiality and encryption. B...
This paper presents a comprehensive signcryption scheme based on elliptic curves. In addition to the...
Blind signcryption schemes are the extension of signcryption schemes. They are used to protect the p...
Signcryption is a new cryptographic approach which provides authentication and encryption simultaneo...
Abstract—In this paper, we present a signcryption scheme based on elliptic curve cryptosystem, which...
[[abstract]]An efficient signcryption scheme based on elliptic curve is proposed in this paper. The ...
Proxy signature allows original signer to delegate his/her signing capability to proxy signer such t...
Signcryption is cryptographic primitive which simultaneously provide both the function of digital si...
As two fundamental requirements to ensure secure communications over an insecure public network chan...
Proxy signature allows original signer to delegate his/her signing capability to proxy signer such t...
Signcryption schemes are compact and specially suited for efficiency-critical applications such as s...
Signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of sig...
In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well a...
With the rapid growth in internet technology anonymity, repudiation and smacking the contents of mes...
ABSTRACT In order to obtain promising wireless communication systems, it is necessary to maintain s...
Signcryption is a new cryptographic technology which provides both confidentiality and encryption. B...
This paper presents a comprehensive signcryption scheme based on elliptic curves. In addition to the...
Blind signcryption schemes are the extension of signcryption schemes. They are used to protect the p...
Signcryption is a new cryptographic approach which provides authentication and encryption simultaneo...
Abstract—In this paper, we present a signcryption scheme based on elliptic curve cryptosystem, which...
[[abstract]]An efficient signcryption scheme based on elliptic curve is proposed in this paper. The ...
Proxy signature allows original signer to delegate his/her signing capability to proxy signer such t...
Signcryption is cryptographic primitive which simultaneously provide both the function of digital si...
As two fundamental requirements to ensure secure communications over an insecure public network chan...
Proxy signature allows original signer to delegate his/her signing capability to proxy signer such t...
Signcryption schemes are compact and specially suited for efficiency-critical applications such as s...
Signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of sig...
In 2006, Pomykala et al. proposed an elliptic curve based threshold proxy signature scheme as well a...
With the rapid growth in internet technology anonymity, repudiation and smacking the contents of mes...
ABSTRACT In order to obtain promising wireless communication systems, it is necessary to maintain s...
Signcryption is a new cryptographic technology which provides both confidentiality and encryption. B...