Publisher
Springer Science and Business Media LLC
Reference13 articles.
1. Al-Riyami, S.S., Paterson, K.G. (2003). Certificateless public key cryptography. In Proceedings of Cryptology-ASIACRYPT, vol.2894 of Lecture Notes in Computer Science, pp. 452-474.
2. Shamir, A. (1984). Identity-based cryptosystem and signature scheme. In Proceedings of the Cryptology CRYPTO, vol.196 of Lecture Notes in Computer Science, pp. 120-126.
3. Barbosa, M., Farshim, P. (2008). Certificateless signcryption, In Proceedings of ACM Symposium on Information, Computer and Communications Security, pp. 369-372.
4. Wu, C., Chen, Z. (2008). A new efficient certificateless signcryption scheme. In: Proceedings of the international symposium on information science and engineering, pp. 661-664.
5. Xie, W., Zhang, Z. (2010). Efficient and provably secure certificateless signcryption from bilinear maps. In Proceedings of IEEE international conference on wireless communications, networking and information security, pp. 558-562.