Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference38 articles.
1. Memon I, Hussain I, Akhtar R, Chen G (2015) Enhanced Privacy and authentication: An efficient and secure communication for location based service using asymmetric cryptography scheme. Wirel Pers Commun 84(2):1487–1508
2. Ullah S., Li X. (2020) % Lan, Z, A novel trusted third party based signcryption scheme. Multimedia tools and application. https://doi.org/10.1007/s11.042-020-09027-w
3. Ullah S, Li X, % Lan Z (2017) A review of signcryption schemes based on hyper elliptic curve. 3rd International Conference on Big Data Computing and Communications (BIGCOM), 51–58
4. Ullah S, Li X, Hussain MT, % Lan Z (2019) Kernel homomorphic encryption protocol. Journal of Information Security and Applications 48:102366
5. Asif RA (2016) Efficient computation for hyper elliptic curve based cryptography. 2016, Electronic Theses and Dissertations, pp: 1-117.5719. https://scholar.uwindsor.ca/etd/5719
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献