Journal articles on the topic 'Bilinear pairing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Bilinear pairing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
DU, Xin-Jun. "Chameleon Signature from Bilinear Pairing." Journal of Software 18, no. 10 (2007): 2662. http://dx.doi.org/10.1360/jos182662.
Full textLIU, Wen-Hao, and Chun-Xiang XU. "Certificateless Signcryption Scheme Without Bilinear Pairing." Journal of Software 22, no. 8 (September 9, 2011): 1918–26. http://dx.doi.org/10.3724/sp.j.1001.2011.03891.
Full textSomberg, Petr. "Invariant Bilinear Pairing for Twistor Spinors." Advances in Applied Clifford Algebras 19, no. 3-4 (November 20, 2009): 947–57. http://dx.doi.org/10.1007/s00006-009-0195-y.
Full textDONG, GUOFAGN, FEI GAO, WENBO SHI, and PENG GONG. "An efficient certificateless blind signature scheme without bilinear pairing." Anais da Academia Brasileira de Ciências 86, no. 2 (June 2014): 1003–11. http://dx.doi.org/10.1590/0001-3765201420130199.
Full textGao, Ronghai, Jiwen Zeng, and Lunzhi Deng. "Efficient Certificateless Anonymous Multi-Receiver Encryption Scheme without Bilinear Parings." Mathematical Problems in Engineering 2018 (July 24, 2018): 1–13. http://dx.doi.org/10.1155/2018/1486437.
Full textZhang, Jian Hong, Hua Chen, and Yi Xian Yang. "Efficient Blind Signature Scheme Based on Modified Generalized Bilinear Inversion." Key Engineering Materials 439-440 (June 2010): 1265–70. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.1265.
Full textLiu, Wenhao, Qi Xie, Shengbao Wang, Lidong Han, and Bin Hu. "Pairing-Free Certificateless Signature with Security Proof." Journal of Computer Networks and Communications 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/792063.
Full textRen, Yanli, Min Dong, Zhihua Niu, and Xiaoni Du. "Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/4892814.
Full textLUO, Li-xia, and Jun ZHANG. "Dynamic threshold signature scheme based on bilinear pairing." Journal of Computer Applications 30, no. 3 (April 2, 2010): 677–79. http://dx.doi.org/10.3724/sp.j.1087.2010.00677.
Full textQU, Juan, and Jian-zhong ZHANG. "Dynamic general secret sharing based on bilinear pairing." Journal of Computer Applications 30, no. 11 (December 14, 2010): 3036–37. http://dx.doi.org/10.3724/sp.j.1087.2010.03036.
Full textYONEYAMA, Kazuki. "Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E100.A, no. 9 (2017): 1794–803. http://dx.doi.org/10.1587/transfun.e100.a.1794.
Full textWang, L., L. Wang, and C. K. Wu. "Efficient identity-based multicast scheme from bilinear pairing." IEE Proceedings - Communications 152, no. 6 (2005): 877. http://dx.doi.org/10.1049/ip-com:20045308.
Full textZhang, Yingying, and Jiwen ZENG. "An Efficient Proxy Ring Signature Without Bilinear Pairing*." Chinese Journal of Electronics 28, no. 3 (May 1, 2019): 514–20. http://dx.doi.org/10.1049/cje.2019.02.002.
Full textLi, Sujuan, and Futai Zhang. "A new multi-proxy signature from bilinear pairing." Journal of Electronics (China) 24, no. 1 (January 2007): 90–94. http://dx.doi.org/10.1007/s11767-005-0074-1.
Full textLiming, Wang, and Wu Chuankun. "Idetity based group key agreement from bilinear pairing." Wuhan University Journal of Natural Sciences 11, no. 6 (November 2006): 1731–35. http://dx.doi.org/10.1007/bf02831862.
Full textChandrasekaran, Balaji, and Ramadoss Balakrishnan. "An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments." Cryptography 2, no. 3 (July 15, 2018): 14. http://dx.doi.org/10.3390/cryptography2030014.
Full textDong Xie, Zhonghua Shen, and Jiajia Li. "A Proxy Threshold Ring Signature Scheme from Bilinear Pairing." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 4, no. 23 (December 31, 2012): 473–80. http://dx.doi.org/10.4156/aiss.vol4.issue23.59.
Full textPeng, Huaxi. "A Forward Secure Threshold Signature Scheme from Bilinear Pairing." Journal of Computer Research and Development 44, no. 4 (2007): 574. http://dx.doi.org/10.1360/crad20070405.
Full textPeng, Huaxi. "A Forward Secure Threshold Signature Scheme from Bilinear Pairing." Journal of Computer Research and Development 44, no. 5 (2007): 574. http://dx.doi.org/10.1360/crad20070505.
Full textMa, Chunbo. "A New Chameleon Threshold Signature Based on Bilinear Pairing." Journal of Computer Research and Development 42, no. 8 (2005): 1427. http://dx.doi.org/10.1360/crad20050823.
Full textThakur, Tejeshwari, Neetu Sharma, and Birendra Kumar Sharma. "Efficient Design of Certificateless Chameleon Signature from Bilinear Pairing." International Journal of Database Theory and Application 7, no. 3 (June 30, 2014): 23–30. http://dx.doi.org/10.14257/ijdta.2014.7.3.03.
Full textGoriparthi, Thulasi, Manik Lal Das, and Ashutosh Saxena. "An improved bilinear pairing based remote user authentication scheme." Computer Standards & Interfaces 31, no. 1 (January 2009): 181–85. http://dx.doi.org/10.1016/j.csi.2007.11.016.
Full textSahu, Rajeev Anand, and Sahadeo Padhye. "ID-based signature schemes from bilinear pairing: A survey." Frontiers of Electrical and Electronic Engineering in China 6, no. 4 (December 2011): 487–500. http://dx.doi.org/10.1007/s11460-011-0119-1.
Full textTartary, C., S. Zhou, D. Lin, H. Wang, and J. Pieprzyk. "Analysis of bilinear pairing-based accumulator for identity escrowing." IET Information Security 2, no. 4 (2008): 99. http://dx.doi.org/10.1049/iet-ifs:20070091.
Full textRajaram, Sangeetha, Tanmoy Maitra, Satyanarayana Vollala, N. Ramasubramanian, and Ruhul Amin. "eUASBP: enhanced user authentication scheme based on bilinear pairing." Journal of Ambient Intelligence and Humanized Computing 11, no. 7 (July 6, 2019): 2827–40. http://dx.doi.org/10.1007/s12652-019-01388-x.
Full textMishra, Shivendu, Ritika Yaduvanshi, Anjani Kumar Rai, and Nagendra Pratap Singh. "An ID-Based Signature Scheme from Bilinear Pairing Based on Ex-K-Plus Problem." Advanced Materials Research 403-408 (November 2011): 929–34. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.929.
Full textYu, Jinxia, Guanghui He, Xixi Yan, Yongli Tang, and Rongxia Qin. "Outsourced ciphertext-policy attribute-based encryption with partial policy hidden." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772092636. http://dx.doi.org/10.1177/1550147720926368.
Full textSenthil Kumar, T., and S. Prabakaran. "Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design." Measurement and Control 52, no. 7-8 (July 17, 2019): 788–93. http://dx.doi.org/10.1177/0020294019842893.
Full textGuo, Fuchun, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, and Vijay Varadharajan. "Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices." IEEE Transactions on Dependable and Secure Computing 14, no. 2 (March 1, 2017): 211–20. http://dx.doi.org/10.1109/tdsc.2015.2445760.
Full textChou, Jue-Sam. "A Novelk-out-of-nOblivious Transfer Protocol from Bilinear Pairing." Advances in Multimedia 2012 (2012): 1–9. http://dx.doi.org/10.1155/2012/630610.
Full textHe, Daojing, Chun Chen, Sammy Chan, and Jiajun Bu. "Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions." IEEE Transactions on Wireless Communications 11, no. 1 (January 2012): 48–53. http://dx.doi.org/10.1109/twc.2011.110811.111240.
Full textBalasubramanian, V., and T. Mala. "Cloud data integrity checking using bilinear pairing and network coding." Cluster Computing 22, S3 (February 12, 2018): 6927–35. http://dx.doi.org/10.1007/s10586-018-1805-z.
Full textFan, Chun-I., Wei-Zhe Sun, and Vincent Shi-Ming Huang. "Provably secure randomized blind signature scheme based on bilinear pairing." Computers & Mathematics with Applications 60, no. 2 (July 2010): 285–93. http://dx.doi.org/10.1016/j.camwa.2010.01.021.
Full textChung, Jui-Ting, Chuan-Ming Li, and Tzonelih Hwang. "All-in-one group-oriented cryptosystem based on bilinear pairing." Information Sciences 177, no. 24 (December 2007): 5651–63. http://dx.doi.org/10.1016/j.ins.2007.06.026.
Full textIslam, SK Hafizul, Muhammad Khurram Khan, and Ali M. Al-Khouri. "Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing." Security and Communication Networks 8, no. 13 (November 14, 2014): 2214–31. http://dx.doi.org/10.1002/sec.1165.
Full textAli, Ikram, Yong Chen, Niamat Ullah, Muhammad Afzal, and Wen HE. "Bilinear Pairing-Based Hybrid Signcryption for Secure Heterogeneous Vehicular Communications." IEEE Transactions on Vehicular Technology 70, no. 6 (June 2021): 5974–89. http://dx.doi.org/10.1109/tvt.2021.3078806.
Full textHakeem, Shimaa A. Abdel, and HyungWon Kim. "Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X." Sensors 21, no. 2 (January 19, 2021): 665. http://dx.doi.org/10.3390/s21020665.
Full textDeng, Lunzhi, Jiwen Zeng, and Yunyun Qu. "Certificateless Proxy Signature from RSA." Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/373690.
Full textKapfer, Simon. "Symmetric powers of symmetric bilinear forms, homogeneous orthogonal polynomials on the sphere and an application to compact Hyperkähler manifolds." Communications in Contemporary Mathematics 19, no. 02 (February 20, 2017): 1650007. http://dx.doi.org/10.1142/s0219199716500073.
Full textJunqing Liang, XiJun Lin, and Feng Liu. "CLPKE Against A Variation of Key Replacement Attack without Bilinear Pairing." Journal of Convergence Information Technology 7, no. 3 (February 29, 2012): 137–45. http://dx.doi.org/10.4156/jcit.vol7.issue3.16.
Full textWANG, Yi, and Weizhang DU. "Security analysis and improvement of certificateless signature scheme without bilinear pairing." Journal of Computer Applications 33, no. 8 (November 5, 2013): 2250–52. http://dx.doi.org/10.3724/sp.j.1087.2013.02250.
Full textKofi Kwansah Ansah, Albert, Li Lu, Daniel Adu-Gyamfi, Stephen Anokye, and Chenfeng Tang. "SPPBPS: A Secure Privacy-Preservation Bilinear Pairing Scheme for Bitcoin Cryptocurrency." Journal of Physics: Conference Series 1432 (January 2020): 012088. http://dx.doi.org/10.1088/1742-6596/1432/1/012088.
Full textBrickell, Ernie, and Jiangtao Li. "Enhanced privacy ID from bilinear pairing for hardware authentication and attestation." International Journal of Information Privacy, Security and Integrity 1, no. 1 (2011): 3. http://dx.doi.org/10.1504/ijipsi.2011.043729.
Full textThakurh, Tejeshwari. "ID-Based Directed Multi Proxy Chameleon Signature Scheme with Bilinear Pairing." International Journal of Computer Trends and Technology 31, no. 1 (January 25, 2016): 35–41. http://dx.doi.org/10.14445/22312803/ijctt-v31p107.
Full textShi, Wenbo, Neeraj Kumar, Peng Gong, and Zezhong Zhang. "Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing." Frontiers of Computer Science 8, no. 4 (April 21, 2014): 656–66. http://dx.doi.org/10.1007/s11704-014-3245-0.
Full textMahmoodi, Ali, Javad Mohajery, and Mahmoud Salmasizadeh. "A certificate-based proxy signature with message recovery without bilinear pairing." Security and Communication Networks 9, no. 18 (November 28, 2016): 4983–91. http://dx.doi.org/10.1002/sec.1669.
Full textPrasad, Shilpee, and Purushothama B.R. "CCA secure and efficient proxy re-encryption scheme without bilinear pairing." Journal of Information Security and Applications 58 (May 2021): 102703. http://dx.doi.org/10.1016/j.jisa.2020.102703.
Full textGroza, Bogdan, and Pal-Stefan Murvay. "Identity-Based Key Exchange on In-Vehicle Networks: CAN-FD & FlexRay." Sensors 19, no. 22 (November 12, 2019): 4919. http://dx.doi.org/10.3390/s19224919.
Full textSong, Cheng, Mingyue Zhang, Zongpu Jia, Weiping Peng, and Hairu Guo. "A lightweight batch anonymous authentication scheme for VANET based on pairing-free." Computer Science and Information Systems 15, no. 3 (2018): 549–67. http://dx.doi.org/10.2298/csis171222022s.
Full textChin, Ji-Jian, Syh-Yuan Tan, Swee-Huay Heng, and Raphael C. W. Phan. "Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes." Scientific World Journal 2014 (2014): 1–14. http://dx.doi.org/10.1155/2014/170906.
Full text