Found: 15
Select item for more details and to access through your institution.
A Review of Cryptographic Electronic Voting.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 5, p. 858, doi. 10.3390/sym14050858
- By:
- Publication type:
- Article
ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 9, p. 1640, doi. 10.3390/sym13091640
- By:
- Publication type:
- Article
An Implementation Suite for a Hybrid Public Key Infrastructure.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 8, p. 1535, doi. 10.3390/sym13081535
- By:
- Publication type:
- Article
A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 8, p. 1330, doi. 10.3390/sym13081330
- By:
- Publication type:
- Article
An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model.
- Published in:
- KSII Transactions on Internet & Information Systems, 2014, v. 8, n. 7, p. 2532, doi. 10.3837/tiis.2014.07.019
- By:
- Publication type:
- Article
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 4, p. 910, doi. 10.3837/tiis.2013.04.018
- By:
- Publication type:
- Article
Rank AGS Identification Scheme and Signature Scheme.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 5, p. 1139, doi. 10.3390/math11051139
- By:
- Publication type:
- Article
Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 52, doi. 10.3390/a10020052
- By:
- Publication type:
- Article
Transformation from e-voting to e-cheque.
- Published in:
- PLoS ONE, 2024, v. 19, n. 6, p. 1, doi. 10.1371/journal.pone.0302659
- By:
- Publication type:
- Article
IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 1, p. 127, doi. 10.1007/s11277-016-3320-y
- By:
- Publication type:
- Article
An In-Depth Analysis on Efficiency and Vulnerabilities on a Cloud-Based Searchable Symmetric Encryption Solution.
- Published in:
- Journal of Informatics & Web Engineering (JIWE), 2024, v. 3, n. 1, p. 277, doi. 10.33093/jiwe.2024.3.1.19
- By:
- Publication type:
- Article
Cryptanalysis of a certificateless identification scheme.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 122, doi. 10.1002/sec.963
- By:
- Publication type:
- Article
Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme.
- Published in:
- Scientific World Journal, 2015, v. 2015, p. 1, doi. 10.1155/2015/237514
- By:
- Publication type:
- Article
Efficient and provable secure pairing-free security-mediated identity-based identification schemes.
- Published in:
- 2014
- By:
- Publication type:
- journal article
Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes.
- Published in:
- Scientific World Journal, 2014, p. 1, doi. 10.1155/2014/170906
- By:
- Publication type:
- Article