Citations in impact factor journals
Efficient signcryption in the standard model : Signcryption in the standard model Concurrency and Computation Practice and Experience |
Environmental health impacts and controlling measures of anthropogenic activities on groundwater quality in Southwestern Nigeria Environmental Monitoring and Assessment Vol. 194, Issue 5, , 2022 |
Arsenic concentrations in soil, water, and rice grains of rice-growing areas of Punjab, Pakistan: multivariate statistical analysis Environmental Monitoring and Assessment Vol. 194, Issue 5, , 2022 |
A robust stochastic approach in correcting the TRMM precipitation product and simulating flood features Environmental Monitoring and Assessment Vol. 194, Issue 5, , 2022 |
Efficient signcryption scheme based on El-Gamal and
Schnorr Multimedia Tools and Applications |
A Multi Recipient Aggregate Signcryption Scheme Based on Elliptic Curve Wireless Personal Communications |
Scientometric analysis and scientific trends on microplastics research Chemosphere |
Cytogenotoxicity assessment in Allium cepa roots exposed to methyl orange treated with Oedogonium subplagiostomum AP1 Environmental Research |
Polycyclic aromatic hydrocarbon sequestration by intertidal phototrophic biofilms cultivated in hydrophobic and hydrophilic biofilm-promoting culture vessels Journal of Hazardous Materials |
The ethnobotany and antimicrobial activity of selected medicinal plants from Ga-Mashashane, Limpopo Province, South Africa South African Journal of Botany |
Impact of Data Privacy and Confidentiality on Developing Telemedicine Applications: A Review Participates Opinion and Expert Concerns International Journal of Pharmacology Vol. 7, Issue 3, 382, 2011 |
Citation to this article as recorded by
. Intravenous inoculation of replication-deficient recombinant vaccinia virus DIs expressing simian immunodeficiency virus gag controls highly pathogenic simian-human immunodeficiency virus in monkeys. |
. Matrix metalloproteinases and tumor metastasis. |
Fan, J., Y. Zheng and X. Tang, 2010. Signcryption with non-interactive non-repudiation without random oracles. Trans. Comput. Sci. Lect. Notes Comput. Sci., 6340: 202-230. CrossRef |
Fan, J., Y. Zheng and X. Tang, 2010. Signcryption with non-interactive non-repudiation without random oracles. Trans. Comput. Sci. Lect. Notes Comput. Sci., 6340: 202-230. CrossRef |
Fan, J., Y. Zheng and X. Tang, 2010. Signcryption with non-interactive non-repudiation without random oracles. Trans. Comput. Sci. Lect. Notes Comput. Sci., 6340: 202-230. CrossRef |
Liu, C., Y. Zhou, Y. Xiao and G. Sun, 2011. Encryption algorithm of RSH (round sheep hash). Inform. Technol. J., 10: 686-690. CrossRefDirect Link |
Zaidan, B.B., A.A. Zaidan and M.L.M. Kiah, 2011. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns. Int. J. Pharmacol., 7: 382-387. CrossRefDirect Link |
Citation to this article as recorded by
Provable secure lightweight hyper elliptic curve-based
communication system for wireless sensor networks International Journal of Communication Systems Vol. 31, Issue 15, e3763, 2018 |
Functional Encryption EAI/Springer Innovations in Communication and Computing |
A Forward Secure Signcryption Scheme with Ciphertext
Authentication for e-Payment Systems using Conic Curve
Cryptography Journal of King Saud University - Computer and Information Sciences |
Curve-Based Security Schemes for Automating the Encryption and Signing of Digital Documents in Organizational Environments Programming and Computer Software Vol. 47, Issue 8, 849, 2021 |
An Efficient Public Verifiable Certificateless Multi-Receiver Signcryption Scheme for IoT Environments IEICE Transactions on Information and Systems Vol. E104.D, Issue 11, 1869, 2021 |
Security of Low Computing Power Devices: A Survey of Requirements, Challenges & Possible Solutions Cybernetics and Information Technologies Vol. 19, Issue 1, 133, 2019 |
An hyper elliptic curve based efficient signcryption scheme for user authentication Journal of Intelligent & Fuzzy Systems Vol. 39, Issue 6, 8487, 2020 |
A Novel Provable Secured Signcryption Scheme PSSS: A
Hyper-Elliptic Curve-Based Approach Mathematics Vol. 7, Issue 8, 686, 2019 |
A Novel Certificateless Signature Scheme for Smart Objects in the
Internet-of-Things Sensors Vol. 17, Issue 12, 1001, 2017 |
Encryption Algorithm of RSH (Round Sheep Hash) Information Technology Journal Vol. 10, Issue 3, 686, 2011 |
An Efficient Signcryption Scheme Using Near-Ring Hybrid Approach for an IoT-Based System International Journal of e-Collaboration Vol. 18, Issue 1, 1, 2022 |
The Indian Farming Community and Their Health Concerns for a Sustainable Agriculture International Journal of Social Ecology and Sustainable Development Vol. 13, Issue 1, 1, 2022 |
Disruptive Innovation in the Middle Eastern FinTech Sector International Journal of Technology and Human Interaction Vol. 18, Issue 1, 1, 2022 |
Assessing The Factors of Cybersecurity Awareness in the Banking Sector Arab Gulf Journal of Scientific Research |
How to cite this article
Mohsen Toorani and Ali Asghar Beheshti Shirazi, 2009. An Elliptic Curve-Based Signcryption Scheme with Forward Secrecy. Journal of Applied Sciences, 9: 1025-1035.
DOI: 10.3923/jas.2009.1025.1035
URL: https://scialert.net/abstract/?doi=jas.2009.1025.1035
DOI: 10.3923/jas.2009.1025.1035
URL: https://scialert.net/abstract/?doi=jas.2009.1025.1035