All Stories

  1. Revisiting the “An Improved Remote user Authentication Scheme with Key Agreement”
  2. Untraceable authentication for large-scale active-tag RFID systems
  3. An efficient mutual authentication RFID scheme based on elliptic curve cryptography
  4. A constant-time identifying large-scale RFID tags using lines on a plane
  5. A response to a critique of “A novel electronic cash system with trustee-based anonymity revocation from pairing,” by Chen, Chou, Sun and Cho (2011)
  6. A Novel Anonymous Proxy Signature Scheme
  7. A Novelk-out-of-nOblivious Transfer Protocol from Bilinear Pairing
  8. A novel electronic cash system with trustee-based anonymity revocation from pairing
  9. Improved multi-server authentication protocol
  10. ChemInform Abstract: Direct Transformation of Aldehydes to Nitriles Using Iodine in Ammonia Water.
  11. An efficient session key generation for NTDR networks based on bilinear paring
  12. A novel mutual authentication scheme based on quadratic residues for RFID systems
  13. Integrity Protection of Document Assets by Computing Skeletons
  14. A Novel Hierarchical Key Management Scheme Based on Quadratic Residues
  15. A fast algorithm for reliability-oriented task assignment in a distributed system
  16. Mental poker game based on a bit commitment scheme through network
  17. Keyed/Unkeyed RIPEMD-128, 192, 256
  18. Terminal pair maximal flow finding using DNA computation
  19. RC hash function
  20. An improvement of an efficient user identification scheme based on ID-based cryptosystem