Finding Contents or People

IoT-friendly certificateless signcryption schemes: Introducing a provably secure scheme in ROM
Authentication in VANETs with Conditional Privacy-Preserving Property Using Certificateless Aggregate Signature Schemes
On Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles: Cryptanalysis and Improvements
On Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles: Cryptanalysis and Improvements
On Secure and Energy-Efficient Message Communication Protocols for Internet of Vehicles: Cryptanalysis and Improvements
Optimized Switching Frequency Voltage Balancing Schemes for Flying Capacitor-Based Multilevel Converters
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks
ECKCI: An ECC-Based Authenticated Key Agreement (AKA) Scheme Resistant to Key Compromise Impersonation Attack for TMIS
A coordinated voltage control scheme based on linearized power flow functions for non-optimal and optimal problems
Control charting methods for monitoring high dimensional data streams: A conceptual classification scheme
Appropriate models for designing frequency control schemes in power systems
Investigation of the effect of polarization between a solvated biomolecule and solvent on the biomolecule ionization energy using the SAC-CI method in the ONIOM scheme: Ascorbic acid in water
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model