Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of SIP authentication and key agreement schemes
We present a survey of authentication and key agreement schemes that are proposed for the
SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …
SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …
Key management for beyond 5G mobile small cells: A survey
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …
are unanimous that densification of mobile networks is the way forward. The densification …
jPBC: Java pairing based cryptography
It has been recently discovered that some cyclic groups that could be used in Cryptography
admit a special bilinear pairing map that introduces extra structure to the group. Bilinear …
admit a special bilinear pairing map that introduces extra structure to the group. Bilinear …
Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography
X Boyen - Annual international cryptology conference, 2003 - Springer
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography
that does not require principals to pre-compute key pairs and obtain certificates for their …
that does not require principals to pre-compute key pairs and obtain certificates for their …
Improved identity-based signcryption
L Chen, J Malone-Lee - International workshop on public key cryptography, 2005 - Springer
Identity-based cryptography is form of public-key cryptography that does not require users to
pre-compute key pairs and obtain certificates for their public keys. Instead, public keys can …
pre-compute key pairs and obtain certificates for their public keys. Instead, public keys can …
A new identity based signcryption scheme from pairings
We present a new identity based scheme using pairings over elliptic curves. It combines the
functionalities of signature and encryption and is provably secure in the random oracle …
functionalities of signature and encryption and is provably secure in the random oracle …
[PDF][PDF] On the implementation of pairing-based cryptosystems
B Lynn - 2007 - crypto.stanford.edu
Pairing-based cryptography has become a highly active research area. We define bilinear
maps, or pairings, and show how they give rise to cryptosystems with new functionality …
maps, or pairings, and show how they give rise to cryptosystems with new functionality …
Secret handshakes from pairing-based key agreements
D Balfanz, G Durfee, N Shankar… - 2003 Symposium on …, 2003 - ieeexplore.ieee.org
Consider a CIA agent who wants to authenticate herself to a server but does not want to
reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that the …
reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that the …
[SÁCH][B] Security in wireless ad hoc and sensor networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals …
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals …
Threshold and identity-based key management and authentication for wireless ad hoc networks
H Deng, A Mukherjee… - … Conference on Information …, 2004 - ieeexplore.ieee.org
As various applications of wireless ad hoc network have been proposed, security has
become one of the big research challenges and is receiving increasing attention. In this …
become one of the big research challenges and is receiving increasing attention. In this …