-
21
Efficiently non-authenticated group key management protocol withstand interruption attack
Published 2009-01-01Subjects: Get full text
Article -
22
-
23
Provably secure partially blind signature without trusted PKG
Published 2010-01-01Subjects: Get full text
Article -
24
Efficiency identity-based threshold group signature scheme
Published 2009-01-01Subjects: Get full text
Article -
25
Analysis and construction for threshold signature scheme based on game theory
Published 2015-05-01Subjects: Get full text
Article -
26
Certificateless signature scheme without bilinear pairings
Published 2012-04-01Subjects: Get full text
Article -
27
Verifier-based password-authenticated key exchange protocol for three-party
Published 2008-01-01Subjects: Get full text
Article -
28
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
Published 2020-02-01Subjects: Get full text
Article -
29
Efficient and provably-secure certificateless sequential aggregate signature scheme
Published 2022-05-01Subjects: Get full text
Article -
30
Research on batch anonymous authentication scheme for VANET based on bilinear pairing
Published 2017-06-01Subjects: “…bilinear pairing…”
Get full text
Article -
31
Dual-proxy key-based threshold signature scheme for ship ad-hoc network
Published 2018-07-01Subjects: Get full text
Article -
32
Security analysis and improvement of strongly secure certificate less signature scheme
Published 2014-05-01Subjects: Get full text
Article -
33
Certificateless strong designated verifier multi-signature
Published 2016-06-01Subjects: Get full text
Article -
34
Damage localization of closing cracks using a signal decomposition technique
Published 2019-04-01Subjects: Get full text
Article -
35
ID-based on-line/off-line threshold signature scheme without bilinear pairing
Published 2013-08-01Subjects: Get full text
Article -
36
On the relative merits of interpolation schemes for the immersed boundary method: a case study with the heat equation
Published 2024-02-01Subjects: Get full text
Article -
37
ID-based transitive signature schemes without random oracle
Published 2010-01-01Subjects: Get full text
Article -
38
Characterization of Micro-Crack Orientation in a Thin Plate Using Quasi-Static Component Generated by Incident Ultrasonic Lamb Waves
Published 2025-01-01Subjects: Get full text
Article -
39
Improved certificateless sequential multi-signature scheme
Published 2015-10-01Subjects: Get full text
Article -
40
Bifurcation analysis of a discrete SIS model with bilinear incidence depending on new infection
Published 2013-07-01Subjects: Get full text
Article