International Conference on Computational Intelligence and Security, volume 1 Beijing, China. December 2009info:eu-repo/semantics/publishe
Thesis (Master's)--University of Washington, 2020With the ever-increasing amount of sensitive ...
International audienceExpanded into two volumes, the Second Edition of Springer's Encyclopedia of Cr...
Cao ZJ, Liu LH. Security analysis of two designated-verifier signature schemes. Journal of Software,...
Signcryption is a new cryptographic technology which provides both confidentiality and encryption. B...
Best Paper AwardTrusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, Decemb...
IFIP World Computer Congress, 15th International Conference on Information Security. Kluwer Academic...
Proceedings of Information Security - 21st International Conference, ISC 2018, Guildford, UK, Septem...
Signcryption is a relatively new way to achieve confidentiality and authentication simultaneously. B...
In this work, we study the cryptographic primitive: signcryption, which combines the functionalities...
Computer security is a field of computer science concerned with the control of risks related to comp...
Proceedings of Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, Decembe...
[[abstract]]Zheng proposed two new authenticated encryption schemes, called signcryption, in 1997. B...
. Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the fu...
Signcryption is a new cryptographic primitive which simultaneously provides both confidentiality and...
ISO has been working on a multi-part authentication mechanisms standard for some years. The rst part...
Thesis (Master's)--University of Washington, 2020With the ever-increasing amount of sensitive ...
International audienceExpanded into two volumes, the Second Edition of Springer's Encyclopedia of Cr...
Cao ZJ, Liu LH. Security analysis of two designated-verifier signature schemes. Journal of Software,...
Signcryption is a new cryptographic technology which provides both confidentiality and encryption. B...
Best Paper AwardTrusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, Decemb...
IFIP World Computer Congress, 15th International Conference on Information Security. Kluwer Academic...
Proceedings of Information Security - 21st International Conference, ISC 2018, Guildford, UK, Septem...
Signcryption is a relatively new way to achieve confidentiality and authentication simultaneously. B...
In this work, we study the cryptographic primitive: signcryption, which combines the functionalities...
Computer security is a field of computer science concerned with the control of risks related to comp...
Proceedings of Trusted Systems - 7th International Conference, INTRUST 2015, Beijing, China, Decembe...
[[abstract]]Zheng proposed two new authenticated encryption schemes, called signcryption, in 1997. B...
. Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the fu...
Signcryption is a new cryptographic primitive which simultaneously provides both confidentiality and...
ISO has been working on a multi-part authentication mechanisms standard for some years. The rst part...
Thesis (Master's)--University of Washington, 2020With the ever-increasing amount of sensitive ...
International audienceExpanded into two volumes, the Second Edition of Springer's Encyclopedia of Cr...
Cao ZJ, Liu LH. Security analysis of two designated-verifier signature schemes. Journal of Software,...