Author:
Ch Shehzad Ashraf,uddin Nizam,Sher Muhammad,Ghani Anwar,Naqvi Husnain,Irshad Azeem
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference28 articles.
1. Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 66(2):165–178
2. Bala S, Sharma G, Verma AK (2013) An improved forward secure elliptic curve signcryption key management scheme for wireless sensor networks. In: IT convergence and security 2012. Springer, pp 141–149
3. Bao F, Deng RH (1998) A signcryption scheme with signature directly verifiable by public key. In: Public key cryptography. Springer, pp 55–59
4. Ch SA, uddin N, Sher M (2012) Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. In: Information systems, technology and management, communications in computer and information science, vol 285. Springer Berlin Heidelberg, pp 135–142
5. Choi HJ, Seo YH, Kim DW (2011) A hybrid encryption technique for digital holography using DCT and DWT. J Inf Commun Converg Eng 9(3):271–275
Cited by
39 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献