Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
35
views
9
references
Top references
cited by
15
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,542
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Cryptology and Network Security
On the Security of Certificateless Signature Schemes from Asiacrypt 2003
other
Author(s):
Xinyi Huang
,
Willy Susilo
,
Yi Mu
,
Futai Zhang
Publication date
(Print):
2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Most cited references
9
Record
: found
Abstract
: not found
Book Chapter
: not found
Identity-Based Cryptosystems and Signature Schemes
Adi Shamir
(1985)
0
comments
Cited
331
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Certificateless Public Key Cryptography
Sattam S. Al-Riyami
,
Kenneth G. Paterson
(2003)
0
comments
Cited
106
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Self-certified public keys
Marc Girault
(1991)
0
comments
Cited
25
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2005
Pages
: 13-25
DOI:
10.1007/11599371_2
SO-VID:
391be456-d5d2-4882-a56e-79c006d2dcd5
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 13
On the Security of Certificateless Signature Schemes from Asiacrypt 2003
Similar content
1,542
Block-CLAP: Blockchain-Assisted Certificateless Key Agreement Protocol for Internet of Vehicles in Smart Transportation
Authors:
Durbadal Chattaraj
,
Basudeb Bera
,
Ashok Das
…
Advances in Cryptology-ASIACRYPT '2000
Authors:
A JUELS
,
M Hirt
A Certificateless-Based Blind Signature Scheme with Message Recovery
Authors:
Xiao Li
,
Mengwen Wang
,
Fengyin Li
See all similar
Cited by
15
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks
Authors:
Kyung Sup Kwak
,
Xiaofeng Chen
,
Zonghua Zhang
…
Certificateless Public-Key Signature: Security Model and Efficient Construction
Authors:
Zhenfeng Zhang
,
Duncan Wong
,
Jing Jing Xu
…
Certificateless Signature Revisited
Authors:
Xinyi Huang
,
Yi Mu
,
Willy Susilo
…
See all cited by