Academic literature on the topic 'Identity-based digital signature'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identity-based digital signature.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Identity-based digital signature"
Wu, Jian. "Identity-Based Proxy Signcryption Schemes." Applied Mechanics and Materials 380-384 (August 2013): 2605–8. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2605.
Full textDr., G. Charles Babu* Mr. K. Rajeshwar Rao. "IMPROVISATION OF PERFORMANCE IN CLUSTER NETWORKS." Global Journal of Engineering Science and Research Management 3, no. 8 (2016): 87–89. https://doi.org/10.5281/zenodo.61145.
Full textWu, Rui, and Shi Ping Yang. "Application of Identity-Based Blind Signature in the Performance Evaluation." Advanced Materials Research 846-847 (November 2013): 1652–55. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1652.
Full textJames, Salome, Gowri Thumbur, and Vasudeva Reddy P. "Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery." International Journal of Information Security and Privacy 15, no. 1 (2021): 117–37. http://dx.doi.org/10.4018/ijisp.2021010106.
Full textTurcanu, Dinu, Serghei Popovici, and Tatiana Turcanu. "DIGITAL SIGNATURE: ADVANTAGES, CHALLENGES AND STRATEGIES." Journal of Social Sciences III (4) (December 15, 2020): 62–72. https://doi.org/10.5281/zenodo.4296327.
Full textShen, Xiao Qin, and Yang Ming. "Identity-Based Convertible Limited Verifier Signature Scheme in the Standard Model." Applied Mechanics and Materials 48-49 (February 2011): 599–602. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.599.
Full textLu, Xiuhua, Qiaoyan Wen, Wei Yin, et al. "Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation." Symmetry 11, no. 2 (2019): 272. http://dx.doi.org/10.3390/sym11020272.
Full textLi, Fengyin, Junhui Wang, Mengxue Shang, Dandan Zhang, and Tao Li. "Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes." Entropy 25, no. 8 (2023): 1159. http://dx.doi.org/10.3390/e25081159.
Full textE.Kamalanaban, Dr, M. Gopinath, and M. Nandhu. "Workflow Signatures for Business Process." International Journal of Engineering & Technology 7, no. 3.34 (2018): 129. http://dx.doi.org/10.14419/ijet.v7i3.34.18788.
Full textZhiming Deng, Dianjun Lu, Teng Chen, and Weixin Yao. "An identity-verifiable quantum threshold group signature scheme based on three-particle GHZ states." Laser Physics 34, no. 5 (2024): 055204. http://dx.doi.org/10.1088/1555-6611/ad3434.
Full textDissertations / Theses on the topic "Identity-based digital signature"
Jeudy, Corentin. "Design of advanced post-quantum signature schemes." Electronic Thesis or Diss., Université de Rennes (2023-....), 2024. http://www.theses.fr/2024URENS018.
Full textDu, Rong. "Secure electronic tendering." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16606/1/Rong_Du_Thesis.pdf.
Full textDu, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.
Full textPrest, Thomas. "Gaussian sampling in lattice-based cryptography." Thesis, Paris, Ecole normale supérieure, 2015. http://www.theses.fr/2015ENSU0045/document.
Full textYoshida, Kayo. "Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem." Thesis, 2009. http://hdl.handle.net/10012/4219.
Full text"Identity-based cryptography from paillier cryptosystem." 2005. http://library.cuhk.edu.hk/record=b5892374.
Full textBook chapters on the topic "Identity-based digital signature"
Frankel, Yair, David W. Kravitz, Charles T. Montgomery, and Moti Yung. "Beyond identity: Warranty-based digital signature transactions." In Financial Cryptography. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055487.
Full textBehnia, Rouzbeh, Swee-Huay Heng, and Che-Sheng Gan. "Short and Efficient Identity-Based Undeniable Signature Scheme." In Trust, Privacy and Security in Digital Business. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32287-7_12.
Full textKim, Seongyeol, and Ilyong Chung. "A Secure Mobile Agent System Applying Identity-Based Digital Signature Scheme." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36087-5_69.
Full textAruna, Juluru, and D. Ashwani. "Improved Identity Based Digital Signature Authentication Using Feistel Algorithm in Cloud Computing." In Lecture Notes in Networks and Systems. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3226-4_35.
Full textBakhtina, Mariia, Jan Kvapil, Petr Švenda, and Raimundas Matulevičius. "The Power of Many: Securing Organisational Identity Through Distributed Key Management." In Advanced Information Systems Engineering. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-61057-8_28.
Full textSuganthi, S. D., R. Anitha, and P. Thanalakshmi. "Authentication in Wireless Sensor Networks Using Dynamic Identity Based Signatures." In Digital Connectivity – Social Impact. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-3274-5_13.
Full textYuan, Xiang, Bingjing Cai, Feiwen Li, Yekang Zhao, Jingjing Ren, and Yongjun Ren. "Data Authentication Mechanism in Internet of Vehicles for Digital Identity Verification with Identity-Based Proxy Homomorphic Signatures." In Communications in Computer and Information Science. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-6243-2_2.
Full textMurphy, Sean, and Rachel Player. "Advanced cryptography." In Cryptography, 2nd ed. Oxford University PressOxford, 2025. https://doi.org/10.1093/actrade/9780192882233.003.0008.
Full textLi, Chang-Tsun. "Biometrics in Virtual Communities and Digital Governments." In Virtual Technologies. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-955-7.ch100.
Full textCattaneo, Giuseppe, Pompeo Faruolo, and Ivan Visconti. "A Distributed and Secure Architecture for Signature and Decryption Delegation through Remote Smart Cards." In Threats, Countermeasures, and Advances in Applied Information Security. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0978-5.ch003.
Full textConference papers on the topic "Identity-based digital signature"
Jin, Hu, He Debiao, and Chen Jianhua. "An Identity Based Digital Signature from ECDSA." In 2010 Second International Workshop on Education Technology and Computer Science. IEEE, 2010. http://dx.doi.org/10.1109/etcs.2010.159.
Full textAmaral, Luiz Fernando Ribeiro, Jorge Guilherme Silva dos Santos, Mateus Almeida Rocha, et al. "Authentication of Identity Documents Using DNSSEC, Digital Signatures and QR Codes." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19512.
Full textZhao Jia, Liu Jiqiang, Han Zhen, and Shen Changxiang. "Identity based digital signature algorithm of XTR system." In 2008 9th International Conference on Signal Processing (ICSP 2008). IEEE, 2008. http://dx.doi.org/10.1109/icosp.2008.4697733.
Full textKuzhalvaimozhi, S., and G. Raghavendra Rao. "Privacy protection in cloud using identity based group signature." In 2014 Fifth International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). IEEE, 2014. http://dx.doi.org/10.1109/icadiwt.2014.6814670.
Full textLi, Feng, and Qingzhen Xu. "Signature Scheme in Eisenstein Ring Based on Multi-Biometric Characteristic Identity." In 2016 6th International Conference on Digital Home (ICDH). IEEE, 2016. http://dx.doi.org/10.1109/icdh.2016.034.
Full textLiangyun Fan, Jiande Zheng, and Jing Yang. "A biometric identity based signature scheme in the standard model." In 2009 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC 2009). IEEE, 2009. http://dx.doi.org/10.1109/icnidc.2009.5360996.
Full textZhao, Jia, and Zhen Han. "Identity-Based Digital Signature Algorithm in Key Exchange on CTP Curves." In 2006 8th international Conference on Signal Processing. IEEE, 2006. http://dx.doi.org/10.1109/icosp.2006.345970.
Full textFujisaki, Mutsumi, Keiichi Iwamura, Masaki Inamura, and Kitahiro Kaneda. "Improvement and implementation of digital content protection scheme using identity based signature." In 2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ). IEEE, 2018. http://dx.doi.org/10.1109/mobisecserv.2018.8311449.
Full textPeng, Zhu, Zhu Xue-fang, and Zhao Ming-sheng. "An Approach to Anti-counterfeit of Identity Document Based on Digital Watermarking and Digital Signature." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.917.
Full textWang, Meihua, Kefeng Fan, Xiaoji Li, and Qingning Zeng. "A Novel Digital Content Protection Scheme Combining Iris Identity Based Digital Signature and Semi-fragile Watermark." In 2006 International Conference on Communication Technology. IEEE, 2006. http://dx.doi.org/10.1109/icct.2006.341747.
Full text