Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Multi‐user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography
Wireless sensor networks (WSNs) have found use in many areas ranging from military to
healthcare among other areas of interest. Multiuser broadcast authentication is an important …
healthcare among other areas of interest. Multiuser broadcast authentication is an important …
Cryptanalysis of a quantum identity-based signature and its improvement
Digital signatures are one of the key cryptographic components for providing authenticity
and non-repudiation. To circumvent the need of certificates, Shamir in 1984 introduced …
and non-repudiation. To circumvent the need of certificates, Shamir in 1984 introduced …
Design and Analysis of Pairing-Friendly Elliptic Curves for Cryptographic Primitives
M Kumar - arxiv preprint arxiv:2307.09610, 2023 - arxiv.org
Elliptic curve cryptography (ECC) is a remarkable mathematical tool that offers the same
level of security as traditional public-key cryptography (PKC) with a significantly smaller key …
level of security as traditional public-key cryptography (PKC) with a significantly smaller key …
An experimentally validated feasible quantum protocol for identity-based signature
Digital signatures are one of the most basic cryptographic building blocks, which are utilized
to provide attractive security features such as authenticity, unforgeability, and undeniability …
to provide attractive security features such as authenticity, unforgeability, and undeniability …
An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication
Digital signatures are one of the simplest cryptographic building blocks that provide
appealing security characteristics such as authenticity, unforgeability, and undeniability. In …
appealing security characteristics such as authenticity, unforgeability, and undeniability. In …
QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing
In recent years, cloud computing plays a vital role in IT industries. Cloud computing is the
sum of software as a service (SaaS) and utility computing (hardware). Elliptic Curve …
sum of software as a service (SaaS) and utility computing (hardware). Elliptic Curve …
Escrow-less identity-based signature scheme with outsourced protection in cloud computing
M Kumar, S Chand - Wireless Personal Communications, 2020 - Springer
The identity-based cryptosystem (IBC) outfits with the most beneficial key management
procedures. The IBC is bounded to the small network system due to the internal key escrow …
procedures. The IBC is bounded to the small network system due to the internal key escrow …
Certificateless Signcryption for Wireless Sensor Networks
P Kasyoka - 2022 - repository.seku.ac.ke
Wireless sensor networks (WSNs) have become popular in the field of information and
communications technology, they are increasingly being used in applications such as …
communications technology, they are increasingly being used in applications such as …
Provable Secure Escrow-Free Identity-Based Signature Scheme for Smart City Environment
M Kumar, S Chand - 2022 - researchsquare.com
Smart city is a concept of digitalizing the ecosystem to solve many urban area issues such
as crime reduction, transportation, waste management, and governance. However, the …
as crime reduction, transportation, waste management, and governance. However, the …