Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2024.3379640
Abstract: Most of the existing signcryption schemes utilize a key generation center to generate pseudonyms without updating, and usually opt for bilinear pairing to design authentication schemes. The disadvantage is that these schemes not only incur…
read more here.
Keywords:
smart terminals;
streamlined signcryption;
signcryption scheme;
signcryption ... See more keywords