These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
118 related articles for article (PubMed ID: 27832105)
1. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity. Pang L; Yan X; Zhao H; Hu Y; Li H PLoS One; 2016; 11(11):e0166173. PubMed ID: 27832105 [TBL] [Abstract][Full Text] [Related]
2. Completely anonymous multi-recipient signcryption scheme with public verification. Pang L; Li H; Gao L; Wang Y PLoS One; 2013; 8(5):e63562. PubMed ID: 23675490 [TBL] [Abstract][Full Text] [Related]
3. Heterogeneous hybrid signcryption for multi-message and multi-receiver. Niu S; Niu L; Yang X; Wang C; Jia X PLoS One; 2017; 12(9):e0184407. PubMed ID: 28886125 [TBL] [Abstract][Full Text] [Related]
4. Secure Smart Cameras by Aggregate-Signcryption with Decryption Fairness for Multi-Receiver IoT Applications. Ullah S; Marcenaro L; Rinner B Sensors (Basel); 2019 Jan; 19(2):. PubMed ID: 30650609 [TBL] [Abstract][Full Text] [Related]
5. An efficient heterogeneous signcryption for smart grid. Jin C; Chen G; Yu C; Shan J; Zhao J; Jin Y PLoS One; 2018; 13(12):e0208311. PubMed ID: 30562351 [TBL] [Abstract][Full Text] [Related]
6. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. Nam J; Choo KK; Han S; Kim M; Paik J; Won D PLoS One; 2015; 10(4):e0116709. PubMed ID: 25849359 [TBL] [Abstract][Full Text] [Related]
7. Quantum attack-resistent certificateless multi-receiver signcryption scheme. Li H; Chen X; Pang L; Shi W PLoS One; 2013; 8(6):e49141. PubMed ID: 23967037 [TBL] [Abstract][Full Text] [Related]
8. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network. Alagarsamy S; Rajagopalan SP PLoS One; 2017; 12(10):e0186207. PubMed ID: 29040290 [TBL] [Abstract][Full Text] [Related]
9. Efficient Linkable Ring Signature Scheme over NTRU Lattice with Unconditional Anonymity. Ye Q; Wang M; Meng H; Xia F; Yan X Comput Intell Neurosci; 2022; 2022():8431874. PubMed ID: 35602625 [TBL] [Abstract][Full Text] [Related]
10. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks. Lu Y; Li J ScientificWorldJournal; 2014; 2014():295419. PubMed ID: 24959606 [TBL] [Abstract][Full Text] [Related]
11. An Efficient Certificateless Anonymous Signcryption Scheme for WBAN. Long W; Deng L; Zeng J; Gao Y; Lu T Sensors (Basel); 2024 Jul; 24(15):. PubMed ID: 39123946 [TBL] [Abstract][Full Text] [Related]
12. Fractional chaotic maps based short signature scheme under human-centered IoT environments. Meshram C; Ibrahim RW; Obaid AJ; Meshram SG; Meshram A; El-Latif AMA J Adv Res; 2021 Sep; 32():139-148. PubMed ID: 34484833 [TBL] [Abstract][Full Text] [Related]
13. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network. Omala AA; Mbandu AS; Mutiria KD; Jin C; Li F J Med Syst; 2018 Apr; 42(6):108. PubMed ID: 29705947 [TBL] [Abstract][Full Text] [Related]
14. Multi-message multi-receiver signcryption scheme based on blockchain. Yang XD; Wang WJ; Shu B; Li MJ; Liu RX; Wang CF Math Biosci Eng; 2023 Sep; 20(10):18146-18172. PubMed ID: 38052552 [TBL] [Abstract][Full Text] [Related]
15. Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls. Zia M; Ali R PLoS One; 2018; 13(12):e0208857. PubMed ID: 30543691 [TBL] [Abstract][Full Text] [Related]
16. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems. Wang C; Shi D; Xu X PLoS One; 2015; 10(3):e0121226. PubMed ID: 25815879 [TBL] [Abstract][Full Text] [Related]
17. An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps. Meshram C; Imoize AL; Aljaedi A; Alharbi AR; Jamal SS; Barve SK Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770346 [TBL] [Abstract][Full Text] [Related]
18. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation. Xu Q; Tan C; Fan Z; Zhu W; Xiao Y; Cheng F Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29772840 [TBL] [Abstract][Full Text] [Related]
19. An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System. Ullah I; Amin NU; Khan MA; Khattak H; Kumari S J Med Syst; 2020 Nov; 45(1):4. PubMed ID: 33247388 [TBL] [Abstract][Full Text] [Related]
20. Identity-Based Matchmaking Encryption with Equality Test. Yan Z; Lin X; Zhang X; Xu J; Qu H Entropy (Basel); 2024 Jan; 26(1):. PubMed ID: 38248199 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]