-
21
Research on improved scheme of resource public key infrastructure data synchronization
Published 2021-06-01Subjects: “…resource public key infrastructure…”
Get full text
Article -
22
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01Subjects: Get full text
Article -
23
Efficient and provably-secure certificateless sequential aggregate signature scheme
Published 2022-05-01Subjects: “…certificateless public key cryptography…”
Get full text
Article -
24
Anonymous authentication scheme based on one-off public key in pervasive computing environments
Published 2012-02-01Subjects: Get full text
Article -
25
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01Subjects: Get full text
Article -
26
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
Published 2021-07-01Subjects: Get full text
Article -
27
Security analysis and improvement of strongly secure certificate less signature scheme
Published 2014-05-01Subjects: Get full text
Article -
28
Certificateless strong designated verifier multi-signature
Published 2016-06-01Subjects: “…certificateless public key cryptography…”
Get full text
Article -
29
-
30
PKI cross-domain authentication scheme based on advanced PBFT algorithm
Published 2020-08-01Subjects: Get full text
Article -
31
Forgery attacks on several certificateless signature schemes
Published 2020-06-01Subjects: Get full text
Article -
32
Proxy re-signature scheme based on isomorphisms of polynomial
Published 2017-02-01Subjects: Get full text
Article -
33
Cryptanalysis of novel extended multivariate public key cryptosystem
Published 2015-06-01Subjects: “…multivariate public key cryptosystems…”
Get full text
Article -
34
Certificateless public key cryptography based provable data possession scheme in edge environment
Published 2022-07-01Subjects: Get full text
Article -
35
Simple Matrix encryption scheme with variable ciphertext length
Published 2018-04-01Subjects: “…multivariable public key cryptography…”
Get full text
Article -
36
Pairing-free certificateless blockchain-based access authentication method for spatial information network
Published 2024-08-01Subjects: Get full text
Article -
37
Improved certificateless sequential multi-signature scheme
Published 2015-10-01Subjects: “…certificateless public key cryptography…”
Get full text
Article -
38
Further research on public-key cryptosystems based on third-order recurrence sequence
Published 2005-01-01Subjects: “…public-key cryptosystem…”
Get full text
Article -
39
Fare non-repudiation protocol based on identity-based cryptography
Published 2009-01-01Subjects: Get full text
Article -
40
Survey on decentralized security-enhanced technologies for RPKI
Published 2024-07-01Subjects: Get full text
Article