Login / Signup
Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks.
Lukasz Krzywiecki
Hannes Salin
Nisha Panwar
Mykola Pavlov
Published in:
NCA (2020)
Keyphrases
</>
signcryption scheme
bilinear pairings
standard model
information leakage
public key
designated verifier
signature scheme
cryptographic protocols
key management
key distribution
real time
security mechanisms
wireless sensor networks
anomaly detection
security protocols
blind signature scheme