Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "verifiability"

ADD TO MY LIST
 
ID-based Signcryption Scheme with (t,n) Shared Unsigncryption

Author(s): Fagen Li | Xiangjun Xin | Yupu Hu
Controlled Secret Leakage

Author(s): Tianjie Cao | Shi Huang | Hui Cui | Yipeng Wu | Qihan Luo
An Anonymous Sealed-bid Electronic Auction Based on Ring Signature

Author(s): Hu Xiong | Zhiguang Qin | Fagen Li
An Elliptic Curve-Based Signcryption Scheme with Forward Secrecy

Author(s): Mohsen Toorani | Ali Asghar Beheshti Shirazi
Multibiometric Based Secure Encryption and Authentication Scheme with Fuzzy Extractor

Author(s): Mingwu Zhang | Bo Yang | Wenzheng Zhang | Tsuyoshi Takagi
The impact of situational context variables on responses to biodata and situational judgment inventory items

Author(s): LAUREN J. RAMSAY | NEAL SCHMITT | FREDERICK L. OSWALD | BRIAN H. KIM | MICHAEL A. GILLESPIE
Reconsiderando o verificacionismo

Author(s): Claudio F. Costa
A Receiptfree MultiAuthority EVoting System

Author(s): Adewole A. Philip | Sodiya Adesina Simon | Arowolo Oluremi. A.
Staff Turnover as a Possible Threat to Knowledge Loss

Author(s): Urbancová Hana | Linhartová Lucie
Efficient Certificateless Signcryption Scheme from Weil Pairing

Author(s): Gang Yu | Hongzhi Yang | Shuqin Fan | Yong Shen | Wenbao Han
A Security Generated Approach towards Mass Elections using Voting Software

Author(s): Aradhana Goutam | Ankit Kandi | Manish Wagh | Kashyap Shah | Prathamesh Tarkar
A Signcryption Scheme based on Elliptic Curve Cryptography

Author(s): R. K. Pateriya | Shreeja Vasudevan
Why do you need a reservation system?      Affiliate Program