Sciweavers

158 search results - page 2 / 32
» Analysis of improved signcryption scheme with key privacy
Sort
View
CCS
2008
ACM
13 years 7 months ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim
DCC
2005
IEEE
14 years 4 months ago
Signcryption with Non-interactive Non-repudiation
Signcryption [35] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a...
John Malone-Lee
VTC
2010
IEEE
167views Communications» more  VTC 2010»
13 years 3 months ago
An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications
—In this paper, we propose a mutual authentication and key agreement scheme for V2I communications. Our scheme improves security and privacy protection compared with the existing...
Jung-Yoon Kim, Hyoung-Kee Choi, John A. Copeland
CSFW
2006
IEEE
13 years 11 months ago
On Key Assignment for Hierarchical Access Control
A key assignment scheme is a cryptographic technique for implementing an information flow policy, sometimes known as hierarchical access control. All the research to date on key ...
Jason Crampton, Keith M. Martin, Peter R. Wild
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 20 hour ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...