参考文献
|
-
Afrianto, I.,Heryandi, A.,Finandhita, A.,Atin, S.(2019).E-Document Authentication With Digital Signature For Smart City: Reference Model.Conference: The 2nd ASEAN Workshop on Information Science and Technology (AWIST2019),Bandung:
-
Akter, S.,Michael, K.,Uddin, M. R.,McCarthy, G.,Rahman, M.(2020).Transforming business using digital innovations: the application of AI, blockchain, cloud and data analytics.Ann. Oper. Res
-
Alawida, M.,Teh, T. S.,Oyinloye, D. P.,Alshoura, W. H.,Ahmad, M.,Alkhawaldeh, R. S.(2020).A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata.IEEE Access,8,113163-113174.
-
Banerjee, S.,Odelu, V.,Das, A. K.,Chattopadhyay, S.,Kumar, N.,Park, Y.,Tanwar, S.(2018).Design of an anonymity-preserving group formation based authentication protocol in global mobility networks.IEEE Access,6,20673-20693.
-
Bralić, V.,Stančić, H.,Stengård, M.(2020).A blockchain approach to digital archiving: digital signature certification chain preservation.Records Management Journal,30(3),345-362.
-
Chong, K. W.,Kim, Y. S.,Choi, J.(2021).A Study of Factors Affecting Intention to Adopt a Cloud-Based Digital Signature Service.Information,12(2)
-
Cui, H.,Qin, B.,Susilo, W.,Nepal, S.(2020).Robust digital signature revisited.Theoretical Computer Science,844,87-96.
-
Dey, S.,Hossain, A.(2019).Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography.IEEE Sensors Letters,3(4),7500204.
-
Diffie, W.,Hellman, M.(1976).New Directions in Cryptography.IEEE Transactions on Information Theory,22,472-492.
-
Duong, D. H.,Susilo, W.,Trinh, V. C.(2020).A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme.Information,11(5)
-
Dzhangarov, I.,Suleymanova, M. A.(2020).Electronic digital signature.IOP Conf. Ser.: Mater. Sci. Eng.,862(052054)
-
Elhabob, R.,Zhao, Y.,Sella, I.,Xiong, H.(2020).An efficient certificateless public key cryptography with authorized equality test in IIoT.Journal of Ambient Intelligence and Humanized Computing,11,1065-1083.
-
El-Rahman, S. A.,Aldawsari, D.,Aldosari, M.,Alrashed, O.,Alsubaie, G.(2018).A Secure Cloud Based Digital Signature Application for IoT.International Journal of E-Services and Mobile Applications,10(3)
-
Géraud, R.,Naccache, D.,Rosie, R.(2019).Robust encryption, extended.Topics in Cryptology - CT-RSA 2019 - the Cryptographers' Track at the RSA Conference 2019,San Francisco, CA, USA:
-
Girault, M.(1991).Self-certified public keys.Advances in Cryptology-EUROCRYPT '91,Berlin, Heidelberg:
-
Gul, E.,Ozturk, S.(2019).A novel hash function based fragile watermarking method for image integrity.Multimedia Tools and Applications,78,17701-17718.
-
He, D.,Zhang, Y.,Wang, D.,Choo, K. K. R.(2020).Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.IEEE Transactions on Dependable and Secure Computing,17(5),1124-1132.
-
Höglund, J.,Lindemer, S.,Furuhed, M.,Raza, S.(2020).PKI4IoT: Towards public key infrastructure for the Internet of Things.Computers & Security,89,101658.
-
Hu, X.,Tan, W.,Xu, H.,Wang, J.,Ma, C.(2017).Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications.Secur. Commun. Netw.,2017,7921782.
-
Huang, Z.,Liu, S.,Mao, X.,Chen, K.,Li, J.(2017).Insight of the protection for data security under selective opening attacks.Inf. Sci.,412,223-241.
-
Kabra, N.,Bhattacharya, P.,Tanwar, S.,Tyagi, S.(2020).MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions.Future Generation Computer Systems,102,574-587.
-
Karati, A.,Islam, S. H.,Biswas, G.,Bhuiyan, M. Z. A.,Vijayakumar, P.,Karuppiah, M.(2018).Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments.IEEE Internet Things J.,5(4),2904-2914.
-
Kazmirchuk, S.,Ilyenko, A.,Ilyenko, S.(2019).Digital Signature Authentication Scheme with Message Recovery Based on the Use of Elliptic Curves.ICCSEEA 2019, AISC 938
-
Kumar, P.,Chouhan, L.(2021).A privacy and session key based authentication scheme for medical IoT networks.Computer Communications,166,154-164.
-
Kuznetsov, A.,Pushkaŕov, A.,Kiyan, N.,Kuznetsova, T.(2018).Code-Based Electronic Digital Signature.The 9th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT’2018, 24-27 May,Kyiv, Ukraine:
-
Kuznetsov, A.,Svatovskij, I.,Kiyan, N.,Pushkáov, A.(2017).Codebased public-key cryptosystems for the post-quantum period.2017 4th International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T),Kharkov:
-
Li, H.,Han, D.(2019).EduRSS: A Blockchain-Based Educational Records Secure Storage and Sharing Scheme.IEEE Access,7,179273-179289.
-
Li, Y.,Li, X.,Liu, X.(2017).A fast and efficient hash function based on generalized chaotic mapping with variable parameters.Neural Comput. Appl.,28(6),1405-1415.
-
Lu, S.,Ostrovsky, R.,Sahai, A.,Shacham, H.,Waters, B.(2013).Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles.J. Cryptol.,26(2),340-373.
-
Lusetti, M.,Salsi, L.,Dallatana, A.(2020).A blockchain based solution for the custody of digital files in forensic medicine.Forensic Science International: Digital Investigation,35,301017.
-
Malik, M.,Dutta, M.,Granjal, J.(2019).A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things.IEEE Access,7,27443-27464.
-
Mezher, A. E.(2018).Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys.International Journal of Electrical and Computer Engineering,8(5)
-
Mouha, N.,Raunak, M. S.,Kuhn, D. R.,Kacker, R.(2018).Finding Bugs in Cryptographic Hash Function Implementations.IEEE Transactions on Reliability,67(3),870-884.
-
Nakhaei, K.,Ansari, F.,Ansari, E. J.(2020).Signature: eliminating third‑party‑hosted JavaScript infection threats using digital signatures.SN Applied Sciences,2(4)
-
Ouyang, M.,Wang, Z.,Li, F.(2021).Digital signature with cryptographic reverse firewalls.Journal of Systems Architecture,116,102029.
-
Rahardja, U.,Sudaryono, S.,Santoso, N. P. L.,Faturahman, A.,Aini, Q.(2020).Covid-19: Digital Signature Impact on Higher Education Motivation Performance.International Journal of Artificial Intelligence Research,4(1)
-
Santini, P.,Baldi, M.,Chiaraluce, F.(2019).Cryptanalysis of a One-Time Code-Based Digital Signature Scheme.2019 IEEE International Symposium on Information Theory (ISIT),Paris, France:
-
Sepahi, R.,Steinfeld, R.,Pieprzyk, J.(2014).Lattice-based certificateless public-key encryption in the standard model.Int. J. Inf. Secur.,13(4),315-333.
-
Shahid, F.,Khan, A.(2020).Smart Digital Signatures (SDS): A post-quantum digital signature scheme for distributed ledgers.Future Generation Computer Systems,111,241-253.
-
Shannon, C. E.(2001).A mathematical theory of communication.ACM SIGMOBILE Mobile Comput. Commun. Rev.,5(1),3-55.
-
Sohal, A. S.,Sandhu, R.,Sood, S. K.,Chang, V.(2018).A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments.Comput. Secur.,74,340-354.
-
Teh, J. S.,Samsudin, A.(2017).A chaos-based authenticated cipher with associated data.Security and Communication Networks,2017,9040518.
-
Teh, J. S.,Tan, K.,Alawida, M.(2019).A chaos-based keyed hash function based on fixed point representation.Cluster Computing,22,649-660.
-
Wazid, M.,Das, A. K.,Bhat, V.,Vasilakos, A. V.(2020).LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment.J. Netw. Comput. Appl.,150,102496.
-
Xue, Y.,Tan, Y.,Liang, C.,Li, Y.,Zheng, J.,Zhang, Q.(2018).RootAgency: A digital signature-based root privilege management agency for cloud terminal devices.Information Sciences,444,36-50.
-
Yang, Y.,Chen, F.,Chen, J.,Zhang, Y.,Yung, K. L.(2019).A secure hash function based on feedback iterative structure.Enterprise Information Systems,13(3),281-302.
-
Ying, B.,Nayak, A.(2019).Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography.Journal of Network and Computer Applications,131,66-74.
-
Yuan, E.,Wang, L.,Cheng, S.,Ao, N.,Guo, Q.(2020).A Key Management Scheme Based on Pairing-Free Identity Based Digital Signature Algorithm for Heterogeneous Wireless Sensor Networks.Sensors,20(6),1543.
-
Zhang, L.,Zhang, H.,Yu, J.,Xian, H.(2020).Blockchain-based two-party fair contract signing scheme.Information Sciences,535,142-155.
-
Zhou, Y.,Guo, G.,Li, F.(2020).Certificateless public key encryption with cryptographic reverse firewalls.Journal of Systems Architecture,109,101754.
|