Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
35
views
11
references
Top references
cited by
15
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,008
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Information Security and Privacy
Certificateless Signature Revisited
other
Author(s):
Xinyi Huang
,
Yi Mu
,
Willy Susilo
,
Duncan S. Wong
,
Wei Wu
Publication date
(Print):
2007
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
11
Record
: found
Abstract
: not found
Book Chapter
: not found
Identity-Based Cryptosystems and Signature Schemes
Adi Shamir
(1985)
0
comments
Cited
331
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Security Arguments for Digital Signatures and Blind Signatures
David Pointcheval
,
Jacques Stern
(2000)
0
comments
Cited
210
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Short Signatures from the Weil Pairing
Dan Boneh
,
Ben Lynn
,
Hovav Shacham
(2004)
0
comments
Cited
122
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Pages
: 308-322
DOI:
10.1007/978-3-540-73458-1_23
SO-VID:
6272a93e-a6cc-4647-b1a2-860391c2ba5a
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 158
Analysis of the SMS4 Block Cipher
pp. 96
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
pp. 308
Certificateless Signature Revisited
pp. 416
Efficient and Secure Comparison for On-Line Auctions
Similar content
3,008
Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV
Authors:
Qian Mei
,
Hu Xiong
,
Jinhao Chen
…
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC
Authors:
Weiqi Luo
,
Anjia Yang
,
Jian Weng
…
Block-CLAP: Blockchain-Assisted Certificateless Key Agreement Protocol for Internet of Vehicles in Smart Transportation
Authors:
Durbadal Chattaraj
,
Basudeb Bera
,
Ashok Das
…
See all similar
Cited by
15
A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing
Authors:
Karthik Sankaranarayanan
,
Xiaodong Lin
,
Sultan Basudan
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
Authors:
Debiao He
,
Sherali Zeadally
,
Libing Wu
A Survey of Security Services, Attacks, and Applications for Vehicular Ad Hoc Networks (VANETs)
Authors:
Muhammad Sameer Sheikh
,
Jun Liang
,
Wensong Wang
See all cited by