scientific article; zbMATH DE number 1341867
From MaRDI portal
Publication:4263422
zbMath0928.94007MaRDI QIDQ4263422
Chandana G. Gamage, Jussipekka Leiwo, Yuliang Zheng
Publication date: 22 September 1999
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
network securityconfidentialitypublic key cryptographyencryptiondigital signaturesfirewallsauthenticitydigital signcryption
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (8)
A secure anonymous proxy signcryption scheme ⋮ Reputation management and signature delegation: A distributed approach ⋮ Signcryption Schemes Based on the Diffie–Hellman Problem ⋮ Applications of Signcryption ⋮ Identity Based Public Verifiable Signcryption Scheme ⋮ Signcryption from randomness recoverable public key encryption ⋮ ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message ⋮ An efficient signcryption scheme with forward secrecy based on elliptic curve
This page was built for publication: