Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
6
search results - page 2 / 2
»
Confidential Signatures and Deterministic Signcryption
Sort
relevance
views
votes
recent
update
View
thumb
title
140
click to vote
IEEECIT
2005
IEEE
153
views
Information Technology
»
more
IEEECIT 2005
»
Identity Based Threshold Proxy Signcryption Scheme
15 years 8 months ago
Download
www.signcryption.org
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
claim paper
Read More »
« Prev
« First
page 2 / 2
Last »
Next »